Dec 13 14:47:49.234338 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:47:49.234366 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:47:49.234379 kernel: BIOS-provided physical RAM map: Dec 13 14:47:49.238428 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 14:47:49.238446 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 14:47:49.238455 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 14:47:49.238473 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Dec 13 14:47:49.238483 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Dec 13 14:47:49.238493 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Dec 13 14:47:49.238502 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 14:47:49.238512 kernel: NX (Execute Disable) protection: active Dec 13 14:47:49.238521 kernel: SMBIOS 2.7 present. Dec 13 14:47:49.238530 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Dec 13 14:47:49.238539 kernel: Hypervisor detected: KVM Dec 13 14:47:49.238553 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:47:49.238563 kernel: kvm-clock: cpu 0, msr 6719a001, primary cpu clock Dec 13 14:47:49.238573 kernel: kvm-clock: using sched offset of 9573700169 cycles Dec 13 14:47:49.238583 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:47:49.238593 kernel: tsc: Detected 2499.998 MHz processor Dec 13 14:47:49.238603 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:47:49.238616 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:47:49.238627 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Dec 13 14:47:49.238637 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:47:49.238648 kernel: Using GB pages for direct mapping Dec 13 14:47:49.238658 kernel: ACPI: Early table checksum verification disabled Dec 13 14:47:49.238668 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Dec 13 14:47:49.238679 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Dec 13 14:47:49.238688 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Dec 13 14:47:49.238699 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Dec 13 14:47:49.238711 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Dec 13 14:47:49.238722 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Dec 13 14:47:49.238733 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Dec 13 14:47:49.238744 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Dec 13 14:47:49.238754 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Dec 13 14:47:49.238765 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Dec 13 14:47:49.238775 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Dec 13 14:47:49.238786 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Dec 13 14:47:49.238798 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Dec 13 14:47:49.238809 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Dec 13 14:47:49.238819 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Dec 13 14:47:49.238835 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Dec 13 14:47:49.238847 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Dec 13 14:47:49.238858 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Dec 13 14:47:49.238869 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Dec 13 14:47:49.238883 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Dec 13 14:47:49.238894 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Dec 13 14:47:49.238906 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Dec 13 14:47:49.238917 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 14:47:49.238929 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 14:47:49.238939 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Dec 13 14:47:49.238950 kernel: NUMA: Initialized distance table, cnt=1 Dec 13 14:47:49.238960 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Dec 13 14:47:49.238974 kernel: Zone ranges: Dec 13 14:47:49.238985 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:47:49.238996 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Dec 13 14:47:49.239006 kernel: Normal empty Dec 13 14:47:49.239018 kernel: Movable zone start for each node Dec 13 14:47:49.239029 kernel: Early memory node ranges Dec 13 14:47:49.239039 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 14:47:49.239050 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Dec 13 14:47:49.239061 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Dec 13 14:47:49.239074 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:47:49.239085 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 14:47:49.239096 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Dec 13 14:47:49.239107 kernel: ACPI: PM-Timer IO Port: 0xb008 Dec 13 14:47:49.239117 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:47:49.239128 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Dec 13 14:47:49.239140 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:47:49.239150 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:47:49.239161 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:47:49.239174 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:47:49.239186 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:47:49.239196 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 14:47:49.239208 kernel: TSC deadline timer available Dec 13 14:47:49.239219 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 14:47:49.239230 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Dec 13 14:47:49.239241 kernel: Booting paravirtualized kernel on KVM Dec 13 14:47:49.239251 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:47:49.239263 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 14:47:49.239276 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 14:47:49.239287 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 14:47:49.239297 kernel: pcpu-alloc: [0] 0 1 Dec 13 14:47:49.239309 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Dec 13 14:47:49.239319 kernel: kvm-guest: PV spinlocks enabled Dec 13 14:47:49.239330 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:47:49.239341 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Dec 13 14:47:49.239352 kernel: Policy zone: DMA32 Dec 13 14:47:49.239363 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:47:49.239377 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:47:49.239396 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:47:49.239408 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:47:49.239419 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:47:49.239430 kernel: Memory: 1934420K/2057760K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 123080K reserved, 0K cma-reserved) Dec 13 14:47:49.239442 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:47:49.239452 kernel: Kernel/User page tables isolation: enabled Dec 13 14:47:49.239464 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:47:49.239485 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:47:49.239496 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:47:49.239508 kernel: rcu: RCU event tracing is enabled. Dec 13 14:47:49.239519 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:47:49.239532 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:47:49.239543 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:47:49.239554 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:47:49.239565 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:47:49.239577 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 14:47:49.239591 kernel: random: crng init done Dec 13 14:47:49.239602 kernel: Console: colour VGA+ 80x25 Dec 13 14:47:49.239613 kernel: printk: console [ttyS0] enabled Dec 13 14:47:49.239623 kernel: ACPI: Core revision 20210730 Dec 13 14:47:49.239636 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Dec 13 14:47:49.239647 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:47:49.239658 kernel: x2apic enabled Dec 13 14:47:49.239670 kernel: Switched APIC routing to physical x2apic. Dec 13 14:47:49.239681 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Dec 13 14:47:49.239696 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998) Dec 13 14:47:49.239707 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 14:47:49.239717 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 14:47:49.239729 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:47:49.239749 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 14:47:49.239762 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:47:49.239773 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:47:49.239785 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Dec 13 14:47:49.239797 kernel: RETBleed: Vulnerable Dec 13 14:47:49.239808 kernel: Speculative Store Bypass: Vulnerable Dec 13 14:47:49.239819 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:47:49.239830 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:47:49.239842 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 14:47:49.239854 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:47:49.239869 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:47:49.239882 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:47:49.239893 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Dec 13 14:47:49.239905 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Dec 13 14:47:49.239917 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Dec 13 14:47:49.239931 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Dec 13 14:47:49.239943 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Dec 13 14:47:49.239954 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Dec 13 14:47:49.239965 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:47:49.239977 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Dec 13 14:47:49.239987 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Dec 13 14:47:49.240000 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Dec 13 14:47:49.240012 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Dec 13 14:47:49.240023 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Dec 13 14:47:49.240034 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Dec 13 14:47:49.240046 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Dec 13 14:47:49.240058 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:47:49.240072 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:47:49.240083 kernel: LSM: Security Framework initializing Dec 13 14:47:49.240094 kernel: SELinux: Initializing. Dec 13 14:47:49.240105 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:47:49.240117 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:47:49.240129 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Dec 13 14:47:49.240186 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Dec 13 14:47:49.240199 kernel: signal: max sigframe size: 3632 Dec 13 14:47:49.240210 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:47:49.240222 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 14:47:49.240236 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:47:49.240249 kernel: x86: Booting SMP configuration: Dec 13 14:47:49.240260 kernel: .... node #0, CPUs: #1 Dec 13 14:47:49.240272 kernel: kvm-clock: cpu 1, msr 6719a041, secondary cpu clock Dec 13 14:47:49.240283 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Dec 13 14:47:49.240295 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Dec 13 14:47:49.240309 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 14:47:49.240319 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:47:49.240332 kernel: smpboot: Max logical packages: 1 Dec 13 14:47:49.240346 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS) Dec 13 14:47:49.240357 kernel: devtmpfs: initialized Dec 13 14:47:49.240368 kernel: x86/mm: Memory block size: 128MB Dec 13 14:47:49.240380 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:47:49.240401 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:47:49.240413 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:47:49.240424 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:47:49.240436 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:47:49.240491 kernel: audit: type=2000 audit(1734101268.509:1): state=initialized audit_enabled=0 res=1 Dec 13 14:47:49.240507 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:47:49.240519 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:47:49.240530 kernel: cpuidle: using governor menu Dec 13 14:47:49.240542 kernel: ACPI: bus type PCI registered Dec 13 14:47:49.240554 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:47:49.240566 kernel: dca service started, version 1.12.1 Dec 13 14:47:49.240578 kernel: PCI: Using configuration type 1 for base access Dec 13 14:47:49.240589 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:47:49.240601 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:47:49.240616 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:47:49.240628 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:47:49.240640 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:47:49.240652 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:47:49.240664 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:47:49.240676 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:47:49.240755 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:47:49.240768 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:47:49.240780 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Dec 13 14:47:49.240794 kernel: ACPI: Interpreter enabled Dec 13 14:47:49.240807 kernel: ACPI: PM: (supports S0 S5) Dec 13 14:47:49.240819 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:47:49.240832 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:47:49.240845 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Dec 13 14:47:49.240856 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:47:49.241105 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:47:49.241227 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 14:47:49.241247 kernel: acpiphp: Slot [3] registered Dec 13 14:47:49.241259 kernel: acpiphp: Slot [4] registered Dec 13 14:47:49.241270 kernel: acpiphp: Slot [5] registered Dec 13 14:47:49.241282 kernel: acpiphp: Slot [6] registered Dec 13 14:47:49.241294 kernel: acpiphp: Slot [7] registered Dec 13 14:47:49.241306 kernel: acpiphp: Slot [8] registered Dec 13 14:47:49.241316 kernel: acpiphp: Slot [9] registered Dec 13 14:47:49.241328 kernel: acpiphp: Slot [10] registered Dec 13 14:47:49.241340 kernel: acpiphp: Slot [11] registered Dec 13 14:47:49.241354 kernel: acpiphp: Slot [12] registered Dec 13 14:47:49.241366 kernel: acpiphp: Slot [13] registered Dec 13 14:47:49.241377 kernel: acpiphp: Slot [14] registered Dec 13 14:47:49.241428 kernel: acpiphp: Slot [15] registered Dec 13 14:47:49.241442 kernel: acpiphp: Slot [16] registered Dec 13 14:47:49.241453 kernel: acpiphp: Slot [17] registered Dec 13 14:47:49.241466 kernel: acpiphp: Slot [18] registered Dec 13 14:47:49.241478 kernel: acpiphp: Slot [19] registered Dec 13 14:47:49.241490 kernel: acpiphp: Slot [20] registered Dec 13 14:47:49.241504 kernel: acpiphp: Slot [21] registered Dec 13 14:47:49.241515 kernel: acpiphp: Slot [22] registered Dec 13 14:47:49.241527 kernel: acpiphp: Slot [23] registered Dec 13 14:47:49.241538 kernel: acpiphp: Slot [24] registered Dec 13 14:47:49.241549 kernel: acpiphp: Slot [25] registered Dec 13 14:47:49.241560 kernel: acpiphp: Slot [26] registered Dec 13 14:47:49.241572 kernel: acpiphp: Slot [27] registered Dec 13 14:47:49.241582 kernel: acpiphp: Slot [28] registered Dec 13 14:47:49.241594 kernel: acpiphp: Slot [29] registered Dec 13 14:47:49.241605 kernel: acpiphp: Slot [30] registered Dec 13 14:47:49.241619 kernel: acpiphp: Slot [31] registered Dec 13 14:47:49.241630 kernel: PCI host bridge to bus 0000:00 Dec 13 14:47:49.241858 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:47:49.241970 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:47:49.242068 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:47:49.242267 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Dec 13 14:47:49.242369 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:47:49.254633 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 14:47:49.254830 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Dec 13 14:47:49.254949 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Dec 13 14:47:49.255114 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Dec 13 14:47:49.255230 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Dec 13 14:47:49.255439 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Dec 13 14:47:49.255564 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Dec 13 14:47:49.255682 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Dec 13 14:47:49.255789 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Dec 13 14:47:49.255900 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Dec 13 14:47:49.256008 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Dec 13 14:47:49.256121 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Dec 13 14:47:49.256230 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Dec 13 14:47:49.256414 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Dec 13 14:47:49.256575 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 14:47:49.256693 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Dec 13 14:47:49.256803 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Dec 13 14:47:49.256915 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Dec 13 14:47:49.257063 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Dec 13 14:47:49.257078 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:47:49.257095 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:47:49.257106 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:47:49.257118 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:47:49.257130 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 14:47:49.257143 kernel: iommu: Default domain type: Translated Dec 13 14:47:49.257154 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:47:49.257264 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Dec 13 14:47:49.257524 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 14:47:49.257651 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Dec 13 14:47:49.257670 kernel: vgaarb: loaded Dec 13 14:47:49.257683 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:47:49.257695 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:47:49.257707 kernel: PTP clock support registered Dec 13 14:47:49.257718 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:47:49.257730 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:47:49.257741 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 14:47:49.257752 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Dec 13 14:47:49.257766 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Dec 13 14:47:49.257778 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Dec 13 14:47:49.257789 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:47:49.257801 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:47:49.257813 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:47:49.257825 kernel: pnp: PnP ACPI init Dec 13 14:47:49.257876 kernel: pnp: PnP ACPI: found 5 devices Dec 13 14:47:49.257887 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:47:49.257899 kernel: NET: Registered PF_INET protocol family Dec 13 14:47:49.257914 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:47:49.257925 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 14:47:49.257937 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:47:49.257948 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:47:49.257961 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 14:47:49.257972 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 14:47:49.257983 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:47:49.258019 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:47:49.258032 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:47:49.258047 kernel: NET: Registered PF_XDP protocol family Dec 13 14:47:49.258289 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:47:49.266473 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:47:49.266638 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:47:49.266740 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Dec 13 14:47:49.266861 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 14:47:49.266979 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Dec 13 14:47:49.267001 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:47:49.267014 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 14:47:49.267026 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Dec 13 14:47:49.267038 kernel: clocksource: Switched to clocksource tsc Dec 13 14:47:49.267049 kernel: Initialise system trusted keyrings Dec 13 14:47:49.267062 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 14:47:49.267073 kernel: Key type asymmetric registered Dec 13 14:47:49.267085 kernel: Asymmetric key parser 'x509' registered Dec 13 14:47:49.267097 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:47:49.267111 kernel: io scheduler mq-deadline registered Dec 13 14:47:49.267123 kernel: io scheduler kyber registered Dec 13 14:47:49.267134 kernel: io scheduler bfq registered Dec 13 14:47:49.267147 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:47:49.267158 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:47:49.267170 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:47:49.267181 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:47:49.267194 kernel: i8042: Warning: Keylock active Dec 13 14:47:49.267205 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:47:49.267219 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:47:49.267332 kernel: rtc_cmos 00:00: RTC can wake from S4 Dec 13 14:47:49.267447 kernel: rtc_cmos 00:00: registered as rtc0 Dec 13 14:47:49.267576 kernel: rtc_cmos 00:00: setting system clock to 2024-12-13T14:47:48 UTC (1734101268) Dec 13 14:47:49.267677 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Dec 13 14:47:49.267691 kernel: intel_pstate: CPU model not supported Dec 13 14:47:49.267704 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:47:49.267715 kernel: Segment Routing with IPv6 Dec 13 14:47:49.267730 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:47:49.267743 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:47:49.267754 kernel: Key type dns_resolver registered Dec 13 14:47:49.267766 kernel: IPI shorthand broadcast: enabled Dec 13 14:47:49.267778 kernel: sched_clock: Marking stable (452884275, 338622585)->(939576327, -148069467) Dec 13 14:47:49.267790 kernel: registered taskstats version 1 Dec 13 14:47:49.267802 kernel: Loading compiled-in X.509 certificates Dec 13 14:47:49.267815 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:47:49.267827 kernel: Key type .fscrypt registered Dec 13 14:47:49.267841 kernel: Key type fscrypt-provisioning registered Dec 13 14:47:49.267853 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:47:49.267865 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:47:49.267877 kernel: ima: No architecture policies found Dec 13 14:47:49.267888 kernel: clk: Disabling unused clocks Dec 13 14:47:49.267900 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:47:49.267912 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:47:49.267924 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:47:49.267935 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:47:49.267950 kernel: Run /init as init process Dec 13 14:47:49.267961 kernel: with arguments: Dec 13 14:47:49.267973 kernel: /init Dec 13 14:47:49.267985 kernel: with environment: Dec 13 14:47:49.267996 kernel: HOME=/ Dec 13 14:47:49.268008 kernel: TERM=linux Dec 13 14:47:49.268019 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:47:49.268036 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:47:49.268054 systemd[1]: Detected virtualization amazon. Dec 13 14:47:49.268111 systemd[1]: Detected architecture x86-64. Dec 13 14:47:49.268125 systemd[1]: Running in initrd. Dec 13 14:47:49.268137 systemd[1]: No hostname configured, using default hostname. Dec 13 14:47:49.268164 systemd[1]: Hostname set to . Dec 13 14:47:49.268183 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:47:49.268197 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:47:49.268210 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:47:49.268224 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:47:49.268237 systemd[1]: Reached target cryptsetup.target. Dec 13 14:47:49.268275 systemd[1]: Reached target paths.target. Dec 13 14:47:49.268288 systemd[1]: Reached target slices.target. Dec 13 14:47:49.268301 systemd[1]: Reached target swap.target. Dec 13 14:47:49.268313 systemd[1]: Reached target timers.target. Dec 13 14:47:49.268330 systemd[1]: Listening on iscsid.socket. Dec 13 14:47:49.268344 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:47:49.268358 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:47:49.268371 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:47:49.268422 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:47:49.268439 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:47:49.268503 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:47:49.268516 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:47:49.268532 systemd[1]: Reached target sockets.target. Dec 13 14:47:49.268545 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:47:49.268559 systemd[1]: Finished network-cleanup.service. Dec 13 14:47:49.268571 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:47:49.268585 systemd[1]: Starting systemd-journald.service... Dec 13 14:47:49.268598 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:47:49.268611 systemd[1]: Starting systemd-resolved.service... Dec 13 14:47:49.268625 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:47:49.268638 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:47:49.268654 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:47:49.268667 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:47:49.268680 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:47:49.268699 systemd-journald[185]: Journal started Dec 13 14:47:49.268783 systemd-journald[185]: Runtime Journal (/run/log/journal/ec24a15764a554bbafd3a8f27209484a) is 4.8M, max 38.7M, 33.9M free. Dec 13 14:47:49.242437 systemd-modules-load[186]: Inserted module 'overlay' Dec 13 14:47:49.403860 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:47:49.403904 kernel: Bridge firewalling registered Dec 13 14:47:49.403923 kernel: SCSI subsystem initialized Dec 13 14:47:49.403937 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:47:49.403956 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:47:49.403975 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:47:49.403991 systemd[1]: Started systemd-journald.service. Dec 13 14:47:49.404014 kernel: audit: type=1130 audit(1734101269.394:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:49.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:49.287986 systemd-resolved[187]: Positive Trust Anchors: Dec 13 14:47:49.423747 kernel: audit: type=1130 audit(1734101269.403:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:49.423798 kernel: audit: type=1130 audit(1734101269.410:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:49.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:49.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:49.287997 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:47:49.434513 kernel: audit: type=1130 audit(1734101269.423:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:49.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:49.288041 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:47:49.299939 systemd-resolved[187]: Defaulting to hostname 'linux'. Dec 13 14:47:49.328932 systemd-modules-load[186]: Inserted module 'br_netfilter' Dec 13 14:47:49.370253 systemd-modules-load[186]: Inserted module 'dm_multipath' Dec 13 14:47:49.404116 systemd[1]: Started systemd-resolved.service. Dec 13 14:47:49.410780 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:47:49.424038 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:47:49.434749 systemd[1]: Reached target nss-lookup.target. Dec 13 14:47:49.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:49.443429 kernel: audit: type=1130 audit(1734101269.434:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:49.458960 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:47:49.461019 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:47:49.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:49.475728 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:47:49.483822 kernel: audit: type=1130 audit(1734101269.476:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:49.486779 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:47:49.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:49.494435 kernel: audit: type=1130 audit(1734101269.488:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:49.494495 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:47:49.506013 dracut-cmdline[207]: dracut-dracut-053 Dec 13 14:47:49.508914 dracut-cmdline[207]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:47:49.574413 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:47:49.598423 kernel: iscsi: registered transport (tcp) Dec 13 14:47:49.625839 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:47:49.625910 kernel: QLogic iSCSI HBA Driver Dec 13 14:47:49.658659 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:47:49.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:49.661485 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:47:49.668983 kernel: audit: type=1130 audit(1734101269.660:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:49.731438 kernel: raid6: avx512x4 gen() 17377 MB/s Dec 13 14:47:49.753435 kernel: raid6: avx512x4 xor() 7967 MB/s Dec 13 14:47:49.771442 kernel: raid6: avx512x2 gen() 17482 MB/s Dec 13 14:47:49.789449 kernel: raid6: avx512x2 xor() 21694 MB/s Dec 13 14:47:49.806448 kernel: raid6: avx512x1 gen() 14702 MB/s Dec 13 14:47:49.824449 kernel: raid6: avx512x1 xor() 12610 MB/s Dec 13 14:47:49.841444 kernel: raid6: avx2x4 gen() 14289 MB/s Dec 13 14:47:49.859439 kernel: raid6: avx2x4 xor() 6466 MB/s Dec 13 14:47:49.877438 kernel: raid6: avx2x2 gen() 13760 MB/s Dec 13 14:47:49.895425 kernel: raid6: avx2x2 xor() 16414 MB/s Dec 13 14:47:49.913423 kernel: raid6: avx2x1 gen() 12761 MB/s Dec 13 14:47:49.931815 kernel: raid6: avx2x1 xor() 14879 MB/s Dec 13 14:47:49.949421 kernel: raid6: sse2x4 gen() 8916 MB/s Dec 13 14:47:49.968441 kernel: raid6: sse2x4 xor() 4604 MB/s Dec 13 14:47:49.986471 kernel: raid6: sse2x2 gen() 5074 MB/s Dec 13 14:47:50.007339 kernel: raid6: sse2x2 xor() 4745 MB/s Dec 13 14:47:50.022437 kernel: raid6: sse2x1 gen() 8526 MB/s Dec 13 14:47:50.040957 kernel: raid6: sse2x1 xor() 4749 MB/s Dec 13 14:47:50.041033 kernel: raid6: using algorithm avx512x2 gen() 17482 MB/s Dec 13 14:47:50.041051 kernel: raid6: .... xor() 21694 MB/s, rmw enabled Dec 13 14:47:50.042100 kernel: raid6: using avx512x2 recovery algorithm Dec 13 14:47:50.058418 kernel: xor: automatically using best checksumming function avx Dec 13 14:47:50.171422 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:47:50.180128 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:47:50.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:50.181000 audit: BPF prog-id=7 op=LOAD Dec 13 14:47:50.181000 audit: BPF prog-id=8 op=LOAD Dec 13 14:47:50.182628 systemd[1]: Starting systemd-udevd.service... Dec 13 14:47:50.187755 kernel: audit: type=1130 audit(1734101270.181:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:50.200724 systemd-udevd[384]: Using default interface naming scheme 'v252'. Dec 13 14:47:50.206931 systemd[1]: Started systemd-udevd.service. Dec 13 14:47:50.209122 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:47:50.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:50.228842 dracut-pre-trigger[392]: rd.md=0: removing MD RAID activation Dec 13 14:47:50.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:50.260874 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:47:50.262599 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:47:50.315812 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:47:50.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:50.393413 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:47:50.402462 kernel: ena 0000:00:05.0: ENA device version: 0.10 Dec 13 14:47:50.435231 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Dec 13 14:47:50.435405 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Dec 13 14:47:50.435705 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:47:78:86:d2:c3 Dec 13 14:47:50.435967 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:47:50.437323 (udev-worker)[433]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:47:50.599437 kernel: AES CTR mode by8 optimization enabled Dec 13 14:47:50.599480 kernel: nvme nvme0: pci function 0000:00:04.0 Dec 13 14:47:50.599743 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Dec 13 14:47:50.599765 kernel: nvme nvme0: 2/0/0 default/read/poll queues Dec 13 14:47:50.600165 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:47:50.600191 kernel: GPT:9289727 != 16777215 Dec 13 14:47:50.600209 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:47:50.600234 kernel: GPT:9289727 != 16777215 Dec 13 14:47:50.600251 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:47:50.600268 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:47:50.617797 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:47:50.694429 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (435) Dec 13 14:47:50.724155 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:47:50.858256 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:47:50.915764 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:47:50.918407 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:47:50.922049 systemd[1]: Starting disk-uuid.service... Dec 13 14:47:50.928461 disk-uuid[570]: Primary Header is updated. Dec 13 14:47:50.928461 disk-uuid[570]: Secondary Entries is updated. Dec 13 14:47:50.928461 disk-uuid[570]: Secondary Header is updated. Dec 13 14:47:51.941261 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:47:51.942068 disk-uuid[572]: The operation has completed successfully. Dec 13 14:47:52.063772 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:47:52.063905 systemd[1]: Finished disk-uuid.service. Dec 13 14:47:52.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:52.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:52.079722 systemd[1]: Starting verity-setup.service... Dec 13 14:47:52.180722 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 14:47:52.394925 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:47:52.398270 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:47:52.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:52.400311 systemd[1]: Finished verity-setup.service. Dec 13 14:47:52.499461 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:47:52.500153 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:47:52.501276 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:47:52.502579 systemd[1]: Starting ignition-setup.service... Dec 13 14:47:52.508024 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:47:52.527721 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:47:52.527789 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:47:52.527810 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:47:52.597868 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:47:52.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:52.600000 audit: BPF prog-id=9 op=LOAD Dec 13 14:47:52.602053 systemd[1]: Starting systemd-networkd.service... Dec 13 14:47:52.630717 systemd-networkd[1097]: lo: Link UP Dec 13 14:47:52.633155 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:47:52.630769 systemd-networkd[1097]: lo: Gained carrier Dec 13 14:47:52.632671 systemd-networkd[1097]: Enumeration completed Dec 13 14:47:52.633048 systemd-networkd[1097]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:47:52.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:52.635044 systemd[1]: Started systemd-networkd.service. Dec 13 14:47:52.637017 systemd[1]: Reached target network.target. Dec 13 14:47:52.642072 systemd[1]: Starting iscsiuio.service... Dec 13 14:47:52.651123 systemd-networkd[1097]: eth0: Link UP Dec 13 14:47:52.652310 systemd-networkd[1097]: eth0: Gained carrier Dec 13 14:47:52.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:52.655853 systemd[1]: Started iscsiuio.service. Dec 13 14:47:52.659045 systemd[1]: Starting iscsid.service... Dec 13 14:47:52.665114 iscsid[1109]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:47:52.669276 iscsid[1109]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:47:52.669276 iscsid[1109]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:47:52.669276 iscsid[1109]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:47:52.669276 iscsid[1109]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:47:52.669276 iscsid[1109]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:47:52.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:52.671357 systemd[1]: Started iscsid.service. Dec 13 14:47:52.676514 systemd-networkd[1097]: eth0: DHCPv4 address 172.31.25.13/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 14:47:52.679113 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:47:52.680269 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:47:52.702443 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:47:52.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:52.703638 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:47:52.704771 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:47:52.705939 systemd[1]: Reached target remote-fs.target. Dec 13 14:47:52.708831 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:47:52.722174 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:47:52.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:52.854043 systemd[1]: Finished ignition-setup.service. Dec 13 14:47:52.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:52.857083 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:47:54.473571 systemd-networkd[1097]: eth0: Gained IPv6LL Dec 13 14:47:56.112243 ignition[1124]: Ignition 2.14.0 Dec 13 14:47:56.112258 ignition[1124]: Stage: fetch-offline Dec 13 14:47:56.112430 ignition[1124]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:47:56.112474 ignition[1124]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:47:56.125946 ignition[1124]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:47:56.126423 ignition[1124]: Ignition finished successfully Dec 13 14:47:56.131665 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:47:56.137339 kernel: kauditd_printk_skb: 16 callbacks suppressed Dec 13 14:47:56.137616 kernel: audit: type=1130 audit(1734101276.132:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:56.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:56.134134 systemd[1]: Starting ignition-fetch.service... Dec 13 14:47:56.156165 ignition[1130]: Ignition 2.14.0 Dec 13 14:47:56.156179 ignition[1130]: Stage: fetch Dec 13 14:47:56.156376 ignition[1130]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:47:56.156430 ignition[1130]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:47:56.172035 ignition[1130]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:47:56.174329 ignition[1130]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:47:56.217927 ignition[1130]: INFO : PUT result: OK Dec 13 14:47:56.222130 ignition[1130]: DEBUG : parsed url from cmdline: "" Dec 13 14:47:56.222130 ignition[1130]: INFO : no config URL provided Dec 13 14:47:56.222130 ignition[1130]: INFO : reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:47:56.228617 ignition[1130]: INFO : no config at "/usr/lib/ignition/user.ign" Dec 13 14:47:56.228617 ignition[1130]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:47:56.228617 ignition[1130]: INFO : PUT result: OK Dec 13 14:47:56.228617 ignition[1130]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Dec 13 14:47:56.228617 ignition[1130]: INFO : GET result: OK Dec 13 14:47:56.228617 ignition[1130]: DEBUG : parsing config with SHA512: da12f89743ee7f1a30c17cf25d102a6861c7e32a8cfd160af99a87c394889eaee70c234be20ba4dd98e3fac41438e22edd3fece0569f32c53a63c630dba59cc3 Dec 13 14:47:56.236525 unknown[1130]: fetched base config from "system" Dec 13 14:47:56.240131 ignition[1130]: fetch: fetch complete Dec 13 14:47:56.236545 unknown[1130]: fetched base config from "system" Dec 13 14:47:56.240148 ignition[1130]: fetch: fetch passed Dec 13 14:47:56.236559 unknown[1130]: fetched user config from "aws" Dec 13 14:47:56.240620 ignition[1130]: Ignition finished successfully Dec 13 14:47:56.253103 systemd[1]: Finished ignition-fetch.service. Dec 13 14:47:56.291009 kernel: audit: type=1130 audit(1734101276.256:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:56.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:56.257351 systemd[1]: Starting ignition-kargs.service... Dec 13 14:47:56.313508 ignition[1136]: Ignition 2.14.0 Dec 13 14:47:56.313521 ignition[1136]: Stage: kargs Dec 13 14:47:56.313734 ignition[1136]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:47:56.313768 ignition[1136]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:47:56.321710 ignition[1136]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:47:56.323649 ignition[1136]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:47:56.325172 ignition[1136]: INFO : PUT result: OK Dec 13 14:47:56.330505 ignition[1136]: kargs: kargs passed Dec 13 14:47:56.330575 ignition[1136]: Ignition finished successfully Dec 13 14:47:56.333558 systemd[1]: Finished ignition-kargs.service. Dec 13 14:47:56.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:56.340414 kernel: audit: type=1130 audit(1734101276.335:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:56.341273 systemd[1]: Starting ignition-disks.service... Dec 13 14:47:56.350726 ignition[1142]: Ignition 2.14.0 Dec 13 14:47:56.350738 ignition[1142]: Stage: disks Dec 13 14:47:56.351099 ignition[1142]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:47:56.351131 ignition[1142]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:47:56.359316 ignition[1142]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:47:56.361219 ignition[1142]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:47:56.363220 ignition[1142]: INFO : PUT result: OK Dec 13 14:47:56.366631 ignition[1142]: disks: disks passed Dec 13 14:47:56.367129 ignition[1142]: Ignition finished successfully Dec 13 14:47:56.369253 systemd[1]: Finished ignition-disks.service. Dec 13 14:47:56.376845 kernel: audit: type=1130 audit(1734101276.370:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:56.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:56.370483 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:47:56.376850 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:47:56.378012 systemd[1]: Reached target local-fs.target. Dec 13 14:47:56.378941 systemd[1]: Reached target sysinit.target. Dec 13 14:47:56.381554 systemd[1]: Reached target basic.target. Dec 13 14:47:56.384147 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:47:56.469999 systemd-fsck[1150]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 14:47:56.480268 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:47:56.487627 kernel: audit: type=1130 audit(1734101276.481:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:56.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:56.488297 systemd[1]: Mounting sysroot.mount... Dec 13 14:47:56.503408 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:47:56.504173 systemd[1]: Mounted sysroot.mount. Dec 13 14:47:56.505255 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:47:56.573155 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:47:56.577879 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:47:56.577946 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:47:56.577982 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:47:56.584875 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:47:56.703164 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:47:56.707435 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:47:56.721407 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1168) Dec 13 14:47:56.724431 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:47:56.724485 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:47:56.724503 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:47:56.731414 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:47:56.733670 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:47:56.809128 initrd-setup-root[1173]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:47:56.875081 initrd-setup-root[1199]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:47:56.884333 initrd-setup-root[1207]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:47:56.889724 initrd-setup-root[1215]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:47:58.198913 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:47:58.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:58.210575 kernel: audit: type=1130 audit(1734101278.202:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:58.203385 systemd[1]: Starting ignition-mount.service... Dec 13 14:47:58.217843 systemd[1]: Starting sysroot-boot.service... Dec 13 14:47:58.237768 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:47:58.237941 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:47:58.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:58.261831 systemd[1]: Finished sysroot-boot.service. Dec 13 14:47:58.267258 kernel: audit: type=1130 audit(1734101278.262:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:58.375400 ignition[1236]: INFO : Ignition 2.14.0 Dec 13 14:47:58.375400 ignition[1236]: INFO : Stage: mount Dec 13 14:47:58.377754 ignition[1236]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:47:58.377754 ignition[1236]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:47:58.390948 ignition[1236]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:47:58.392885 ignition[1236]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:47:58.394429 ignition[1236]: INFO : PUT result: OK Dec 13 14:47:58.397769 ignition[1236]: INFO : mount: mount passed Dec 13 14:47:58.398801 ignition[1236]: INFO : Ignition finished successfully Dec 13 14:47:58.400520 systemd[1]: Finished ignition-mount.service. Dec 13 14:47:58.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:58.403933 systemd[1]: Starting ignition-files.service... Dec 13 14:47:58.409362 kernel: audit: type=1130 audit(1734101278.401:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:58.416049 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:47:58.437814 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1243) Dec 13 14:47:58.441883 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:47:58.441946 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:47:58.441965 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:47:58.461994 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:47:58.473786 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:47:58.499232 ignition[1262]: INFO : Ignition 2.14.0 Dec 13 14:47:58.499232 ignition[1262]: INFO : Stage: files Dec 13 14:47:58.501306 ignition[1262]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:47:58.501306 ignition[1262]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:47:58.513204 ignition[1262]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:47:58.514632 ignition[1262]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:47:58.516495 ignition[1262]: INFO : PUT result: OK Dec 13 14:47:58.533751 ignition[1262]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:47:58.544040 ignition[1262]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:47:58.546109 ignition[1262]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:47:58.634333 ignition[1262]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:47:58.635902 ignition[1262]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:47:58.635902 ignition[1262]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:47:58.635058 unknown[1262]: wrote ssh authorized keys file for user: core Dec 13 14:47:58.693100 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:47:58.695285 ignition[1262]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 14:47:58.804185 ignition[1262]: INFO : GET result: OK Dec 13 14:47:59.049460 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:47:59.051806 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 14:47:59.051806 ignition[1262]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:47:59.064915 ignition[1262]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3433500543" Dec 13 14:47:59.070545 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1267) Dec 13 14:47:59.070575 ignition[1262]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3433500543": device or resource busy Dec 13 14:47:59.070575 ignition[1262]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3433500543", trying btrfs: device or resource busy Dec 13 14:47:59.070575 ignition[1262]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3433500543" Dec 13 14:47:59.070575 ignition[1262]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3433500543" Dec 13 14:47:59.083719 ignition[1262]: INFO : op(3): [started] unmounting "/mnt/oem3433500543" Dec 13 14:47:59.083719 ignition[1262]: INFO : op(3): [finished] unmounting "/mnt/oem3433500543" Dec 13 14:47:59.083719 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 14:47:59.083719 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:47:59.083719 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:47:59.083719 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:47:59.083719 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:47:59.083719 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:47:59.083719 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:47:59.083719 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:47:59.083719 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:47:59.083719 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:47:59.083719 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:47:59.083719 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:47:59.083719 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:47:59.083719 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 14:47:59.083719 ignition[1262]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:47:59.137752 ignition[1262]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2827907866" Dec 13 14:47:59.137752 ignition[1262]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2827907866": device or resource busy Dec 13 14:47:59.137752 ignition[1262]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2827907866", trying btrfs: device or resource busy Dec 13 14:47:59.137752 ignition[1262]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2827907866" Dec 13 14:47:59.137752 ignition[1262]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2827907866" Dec 13 14:47:59.137752 ignition[1262]: INFO : op(6): [started] unmounting "/mnt/oem2827907866" Dec 13 14:47:59.137752 ignition[1262]: INFO : op(6): [finished] unmounting "/mnt/oem2827907866" Dec 13 14:47:59.137752 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 14:47:59.137752 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 14:47:59.137752 ignition[1262]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:47:59.171131 ignition[1262]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem720617878" Dec 13 14:47:59.171131 ignition[1262]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem720617878": device or resource busy Dec 13 14:47:59.171131 ignition[1262]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem720617878", trying btrfs: device or resource busy Dec 13 14:47:59.171131 ignition[1262]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem720617878" Dec 13 14:47:59.171131 ignition[1262]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem720617878" Dec 13 14:47:59.171131 ignition[1262]: INFO : op(9): [started] unmounting "/mnt/oem720617878" Dec 13 14:47:59.171131 ignition[1262]: INFO : op(9): [finished] unmounting "/mnt/oem720617878" Dec 13 14:47:59.171131 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 14:47:59.171131 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:47:59.171131 ignition[1262]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:47:59.171131 ignition[1262]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2270708615" Dec 13 14:47:59.171131 ignition[1262]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2270708615": device or resource busy Dec 13 14:47:59.171131 ignition[1262]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2270708615", trying btrfs: device or resource busy Dec 13 14:47:59.171131 ignition[1262]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2270708615" Dec 13 14:47:59.171131 ignition[1262]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2270708615" Dec 13 14:47:59.205854 ignition[1262]: INFO : op(c): [started] unmounting "/mnt/oem2270708615" Dec 13 14:47:59.205854 ignition[1262]: INFO : op(c): [finished] unmounting "/mnt/oem2270708615" Dec 13 14:47:59.205854 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:47:59.205854 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:47:59.205854 ignition[1262]: INFO : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Dec 13 14:47:59.234058 systemd[1]: mnt-oem2827907866.mount: Deactivated successfully. Dec 13 14:47:59.652610 ignition[1262]: INFO : GET result: OK Dec 13 14:47:59.945450 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:47:59.945450 ignition[1262]: INFO : files: op(f): [started] processing unit "amazon-ssm-agent.service" Dec 13 14:47:59.951140 ignition[1262]: INFO : files: op(f): op(10): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 14:47:59.951140 ignition[1262]: INFO : files: op(f): op(10): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 14:47:59.951140 ignition[1262]: INFO : files: op(f): [finished] processing unit "amazon-ssm-agent.service" Dec 13 14:47:59.951140 ignition[1262]: INFO : files: op(11): [started] processing unit "nvidia.service" Dec 13 14:47:59.951140 ignition[1262]: INFO : files: op(11): [finished] processing unit "nvidia.service" Dec 13 14:47:59.951140 ignition[1262]: INFO : files: op(12): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:47:59.951140 ignition[1262]: INFO : files: op(12): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:47:59.951140 ignition[1262]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Dec 13 14:47:59.951140 ignition[1262]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:47:59.951140 ignition[1262]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:47:59.951140 ignition[1262]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Dec 13 14:47:59.951140 ignition[1262]: INFO : files: op(15): [started] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 14:47:59.951140 ignition[1262]: INFO : files: op(15): [finished] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 14:47:59.951140 ignition[1262]: INFO : files: op(16): [started] setting preset to enabled for "nvidia.service" Dec 13 14:47:59.951140 ignition[1262]: INFO : files: op(16): [finished] setting preset to enabled for "nvidia.service" Dec 13 14:47:59.951140 ignition[1262]: INFO : files: op(17): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:47:59.951140 ignition[1262]: INFO : files: op(17): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:47:59.951140 ignition[1262]: INFO : files: op(18): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:47:59.951140 ignition[1262]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:48:00.011931 kernel: audit: type=1130 audit(1734101279.961:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.011966 kernel: audit: type=1130 audit(1734101279.993:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:59.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:59.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:47:59.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.012261 ignition[1262]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:48:00.012261 ignition[1262]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:48:00.012261 ignition[1262]: INFO : files: files passed Dec 13 14:48:00.012261 ignition[1262]: INFO : Ignition finished successfully Dec 13 14:47:59.959014 systemd[1]: Finished ignition-files.service. Dec 13 14:47:59.975451 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:48:00.023459 initrd-setup-root-after-ignition[1288]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:47:59.977475 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:47:59.978724 systemd[1]: Starting ignition-quench.service... Dec 13 14:47:59.990455 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:47:59.990626 systemd[1]: Finished ignition-quench.service. Dec 13 14:47:59.994526 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:48:00.007819 systemd[1]: Reached target ignition-complete.target. Dec 13 14:48:00.019884 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:48:00.043732 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:48:00.045093 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:48:00.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.046928 systemd[1]: Reached target initrd-fs.target. Dec 13 14:48:00.048668 systemd[1]: Reached target initrd.target. Dec 13 14:48:00.049626 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:48:00.052561 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:48:00.065852 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:48:00.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.068922 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:48:00.081345 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:48:00.084622 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:48:00.087458 systemd[1]: Stopped target timers.target. Dec 13 14:48:00.087943 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:48:00.089352 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:48:00.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.092881 systemd[1]: Stopped target initrd.target. Dec 13 14:48:00.099564 systemd[1]: Stopped target basic.target. Dec 13 14:48:00.100894 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:48:00.107608 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:48:00.109607 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:48:00.111536 systemd[1]: Stopped target remote-fs.target. Dec 13 14:48:00.113143 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:48:00.114828 systemd[1]: Stopped target sysinit.target. Dec 13 14:48:00.116475 systemd[1]: Stopped target local-fs.target. Dec 13 14:48:00.118269 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:48:00.120046 systemd[1]: Stopped target swap.target. Dec 13 14:48:00.121768 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:48:00.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.121953 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:48:00.123551 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:48:00.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.125307 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:48:00.125499 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:48:00.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.127091 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:48:00.127251 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:48:00.130073 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:48:00.132254 systemd[1]: Stopped ignition-files.service. Dec 13 14:48:00.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.144298 iscsid[1109]: iscsid shutting down. Dec 13 14:48:00.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.136623 systemd[1]: Stopping ignition-mount.service... Dec 13 14:48:00.137721 systemd[1]: Stopping iscsid.service... Dec 13 14:48:00.141860 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:48:00.142701 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:48:00.142963 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:48:00.144433 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:48:00.145187 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:48:00.156398 ignition[1301]: INFO : Ignition 2.14.0 Dec 13 14:48:00.156398 ignition[1301]: INFO : Stage: umount Dec 13 14:48:00.156398 ignition[1301]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:48:00.156398 ignition[1301]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:48:00.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.165684 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:48:00.166892 systemd[1]: Stopped iscsid.service. Dec 13 14:48:00.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.171012 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:48:00.172457 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:48:00.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.179709 ignition[1301]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:48:00.181997 ignition[1301]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:48:00.184142 ignition[1301]: INFO : PUT result: OK Dec 13 14:48:00.184452 systemd[1]: Stopping iscsiuio.service... Dec 13 14:48:00.186904 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:48:00.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.187303 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:48:00.187420 systemd[1]: Stopped iscsiuio.service. Dec 13 14:48:00.195830 ignition[1301]: INFO : umount: umount passed Dec 13 14:48:00.196983 ignition[1301]: INFO : Ignition finished successfully Dec 13 14:48:00.199771 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:48:00.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.199867 systemd[1]: Stopped ignition-mount.service. Dec 13 14:48:00.204455 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:48:00.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.204523 systemd[1]: Stopped ignition-disks.service. Dec 13 14:48:00.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.206310 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:48:00.206373 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:48:00.210525 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:48:00.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.211492 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:48:00.213499 systemd[1]: Stopped target network.target. Dec 13 14:48:00.215301 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:48:00.216201 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:48:00.218784 systemd[1]: Stopped target paths.target. Dec 13 14:48:00.221262 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:48:00.224619 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:48:00.229811 systemd[1]: Stopped target slices.target. Dec 13 14:48:00.231991 systemd[1]: Stopped target sockets.target. Dec 13 14:48:00.234136 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:48:00.234205 systemd[1]: Closed iscsid.socket. Dec 13 14:48:00.236032 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:48:00.236191 systemd[1]: Closed iscsiuio.socket. Dec 13 14:48:00.238806 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:48:00.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.239649 systemd[1]: Stopped ignition-setup.service. Dec 13 14:48:00.243163 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:48:00.245292 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:48:00.245435 systemd-networkd[1097]: eth0: DHCPv6 lease lost Dec 13 14:48:00.248998 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:48:00.250165 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:48:00.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.253000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:48:00.251697 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:48:00.251803 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:48:00.257298 systemd[1]: Stopping network-cleanup.service... Dec 13 14:48:00.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.258349 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:48:00.258438 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:48:00.261096 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:48:00.261181 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:48:00.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.266344 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:48:00.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.266419 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:48:00.268031 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:48:00.273234 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:48:00.274227 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:48:00.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.274352 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:48:00.279124 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:48:00.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.279303 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:48:00.283000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:48:00.284216 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:48:00.284295 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:48:00.286844 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:48:00.286904 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:48:00.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.289246 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:48:00.289312 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:48:00.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.291514 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:48:00.291643 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:48:00.293345 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:48:00.293448 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:48:00.297105 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:48:00.304546 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:48:00.304638 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:48:00.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.311355 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:48:00.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.311456 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:48:00.312623 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:48:00.312701 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:48:00.316153 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:48:00.317433 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:48:00.317558 systemd[1]: Stopped network-cleanup.service. Dec 13 14:48:00.320426 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:48:00.320540 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:48:00.655062 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:48:00.655180 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:48:00.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.662911 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:48:00.667373 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:48:00.667484 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:48:00.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:00.672876 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:48:00.689880 systemd[1]: Switching root. Dec 13 14:48:00.717166 systemd-journald[185]: Journal stopped Dec 13 14:48:21.502366 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Dec 13 14:48:21.502444 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:48:21.502464 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:48:21.502479 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:48:21.502490 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:48:21.502505 kernel: SELinux: policy capability open_perms=1 Dec 13 14:48:21.502516 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:48:21.502527 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:48:21.502538 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:48:21.502551 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:48:21.502562 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:48:21.502579 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:48:21.502597 kernel: kauditd_printk_skb: 41 callbacks suppressed Dec 13 14:48:21.502612 kernel: audit: type=1403 audit(1734101283.244:78): auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:48:21.502628 systemd[1]: Successfully loaded SELinux policy in 358.047ms. Dec 13 14:48:21.502643 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 17.267ms. Dec 13 14:48:21.502657 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:48:21.502668 systemd[1]: Detected virtualization amazon. Dec 13 14:48:21.502680 systemd[1]: Detected architecture x86-64. Dec 13 14:48:21.502694 systemd[1]: Detected first boot. Dec 13 14:48:21.502706 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:48:21.502718 kernel: audit: type=1400 audit(1734101283.808:79): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:48:21.502730 kernel: audit: type=1400 audit(1734101283.808:80): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:48:21.502744 kernel: audit: type=1334 audit(1734101283.815:81): prog-id=10 op=LOAD Dec 13 14:48:21.502755 kernel: audit: type=1334 audit(1734101283.815:82): prog-id=10 op=UNLOAD Dec 13 14:48:21.502768 kernel: audit: type=1334 audit(1734101283.824:83): prog-id=11 op=LOAD Dec 13 14:48:21.502779 kernel: audit: type=1334 audit(1734101283.824:84): prog-id=11 op=UNLOAD Dec 13 14:48:21.502790 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:48:21.502801 kernel: audit: type=1400 audit(1734101284.950:85): avc: denied { associate } for pid=1334 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:48:21.502813 kernel: audit: type=1300 audit(1734101284.950:85): arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=1317 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:21.502826 kernel: audit: type=1327 audit(1734101284.950:85): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:48:21.502837 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:48:21.502863 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:48:21.502875 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:48:21.502887 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:48:21.502899 kernel: kauditd_printk_skb: 6 callbacks suppressed Dec 13 14:48:21.502909 kernel: audit: type=1334 audit(1734101301.267:87): prog-id=12 op=LOAD Dec 13 14:48:21.502919 kernel: audit: type=1334 audit(1734101301.267:88): prog-id=3 op=UNLOAD Dec 13 14:48:21.502930 kernel: audit: type=1334 audit(1734101301.269:89): prog-id=13 op=LOAD Dec 13 14:48:21.502940 kernel: audit: type=1334 audit(1734101301.271:90): prog-id=14 op=LOAD Dec 13 14:48:21.502954 kernel: audit: type=1334 audit(1734101301.271:91): prog-id=4 op=UNLOAD Dec 13 14:48:21.502964 kernel: audit: type=1334 audit(1734101301.271:92): prog-id=5 op=UNLOAD Dec 13 14:48:21.502975 kernel: audit: type=1131 audit(1734101301.273:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.502986 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:48:21.502997 kernel: audit: type=1334 audit(1734101301.280:94): prog-id=12 op=UNLOAD Dec 13 14:48:21.503007 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:48:21.503019 kernel: audit: type=1130 audit(1734101301.284:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.503032 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:48:21.503044 kernel: audit: type=1131 audit(1734101301.284:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.503054 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:48:21.503066 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:48:21.503079 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 14:48:21.503090 systemd[1]: Created slice system-getty.slice. Dec 13 14:48:21.503101 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:48:21.503112 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:48:21.503126 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:48:21.503137 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:48:21.503148 systemd[1]: Created slice user.slice. Dec 13 14:48:21.503159 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:48:21.503170 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:48:21.503181 systemd[1]: Set up automount boot.automount. Dec 13 14:48:21.503192 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:48:21.503221 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:48:21.503233 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:48:21.503247 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:48:21.503258 systemd[1]: Reached target integritysetup.target. Dec 13 14:48:21.503269 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:48:21.503281 systemd[1]: Reached target remote-fs.target. Dec 13 14:48:21.503292 systemd[1]: Reached target slices.target. Dec 13 14:48:21.503304 systemd[1]: Reached target swap.target. Dec 13 14:48:21.503315 systemd[1]: Reached target torcx.target. Dec 13 14:48:21.503327 systemd[1]: Reached target veritysetup.target. Dec 13 14:48:21.503339 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:48:21.503350 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:48:21.503364 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:48:21.503375 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:48:21.503419 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:48:21.503432 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:48:21.503443 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:48:21.503454 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:48:21.503465 systemd[1]: Mounting media.mount... Dec 13 14:48:21.503476 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:48:21.503487 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:48:21.503501 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:48:21.503512 systemd[1]: Mounting tmp.mount... Dec 13 14:48:21.503523 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:48:21.503535 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:48:21.503546 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:48:21.503568 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:48:21.503644 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:48:21.503659 systemd[1]: Starting modprobe@drm.service... Dec 13 14:48:21.503689 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:48:21.503700 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:48:21.503712 systemd[1]: Starting modprobe@loop.service... Dec 13 14:48:21.503725 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:48:21.503737 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:48:21.503748 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:48:21.503763 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:48:21.503775 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:48:21.503787 systemd[1]: Stopped systemd-journald.service. Dec 13 14:48:21.503800 kernel: loop: module loaded Dec 13 14:48:21.503811 systemd[1]: Starting systemd-journald.service... Dec 13 14:48:21.503827 systemd-journald[1402]: Journal started Dec 13 14:48:21.503877 systemd-journald[1402]: Runtime Journal (/run/log/journal/ec24a15764a554bbafd3a8f27209484a) is 4.8M, max 38.7M, 33.9M free. Dec 13 14:48:03.244000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:48:03.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:48:03.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:48:03.815000 audit: BPF prog-id=10 op=LOAD Dec 13 14:48:03.815000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:48:03.824000 audit: BPF prog-id=11 op=LOAD Dec 13 14:48:03.824000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:48:04.950000 audit[1334]: AVC avc: denied { associate } for pid=1334 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:48:04.950000 audit[1334]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=1317 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:04.950000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:48:04.956000 audit[1334]: AVC avc: denied { associate } for pid=1334 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:48:04.956000 audit[1334]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=1317 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:04.956000 audit: CWD cwd="/" Dec 13 14:48:04.956000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:04.956000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:04.956000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:48:21.267000 audit: BPF prog-id=12 op=LOAD Dec 13 14:48:21.267000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:48:21.269000 audit: BPF prog-id=13 op=LOAD Dec 13 14:48:21.271000 audit: BPF prog-id=14 op=LOAD Dec 13 14:48:21.271000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:48:21.271000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:48:21.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.280000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:48:21.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.479000 audit: BPF prog-id=15 op=LOAD Dec 13 14:48:21.480000 audit: BPF prog-id=16 op=LOAD Dec 13 14:48:21.480000 audit: BPF prog-id=17 op=LOAD Dec 13 14:48:21.480000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:48:21.480000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:48:21.500000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:48:21.500000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffd3d7b7cd0 a2=4000 a3=7ffd3d7b7d6c items=0 ppid=1 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:21.500000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:48:04.881286 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-12-13T14:48:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:48:21.265436 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:48:04.882103 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-12-13T14:48:04Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:48:21.273579 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:48:04.882124 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-12-13T14:48:04Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:48:04.882158 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-12-13T14:48:04Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:48:04.882169 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-12-13T14:48:04Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:48:04.882201 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-12-13T14:48:04Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:48:04.882214 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-12-13T14:48:04Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:48:04.882412 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-12-13T14:48:04Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:48:04.882453 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-12-13T14:48:04Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:48:04.882466 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-12-13T14:48:04Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:48:04.883122 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-12-13T14:48:04Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:48:04.883157 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-12-13T14:48:04Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:48:04.883175 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-12-13T14:48:04Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:48:04.883190 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-12-13T14:48:04Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:48:04.883206 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-12-13T14:48:04Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:48:04.883219 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-12-13T14:48:04Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:48:20.099180 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-12-13T14:48:20Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:48:20.099454 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-12-13T14:48:20Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:48:20.099575 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-12-13T14:48:20Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:48:20.099772 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-12-13T14:48:20Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:48:20.099868 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-12-13T14:48:20Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:48:20.099982 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-12-13T14:48:20Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:48:21.554423 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:48:21.554592 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:48:21.557605 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:48:21.563869 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:48:21.567211 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:48:21.567298 systemd[1]: Stopped verity-setup.service. Dec 13 14:48:21.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.577123 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:48:21.577197 kernel: fuse: init (API version 7.34) Dec 13 14:48:21.580041 systemd[1]: Started systemd-journald.service. Dec 13 14:48:21.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.580733 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:48:21.581641 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:48:21.582686 systemd[1]: Mounted media.mount. Dec 13 14:48:21.583513 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:48:21.584510 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:48:21.585638 systemd[1]: Mounted tmp.mount. Dec 13 14:48:21.586625 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:48:21.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.587904 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:48:21.588098 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:48:21.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.589613 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:48:21.589736 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:48:21.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.590879 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:48:21.591098 systemd[1]: Finished modprobe@drm.service. Dec 13 14:48:21.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.593264 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:48:21.593407 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:48:21.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.594940 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:48:21.595068 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:48:21.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.596298 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:48:21.596428 systemd[1]: Finished modprobe@loop.service. Dec 13 14:48:21.597643 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:48:21.598938 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:48:21.600736 systemd[1]: Reached target network-pre.target. Dec 13 14:48:21.607993 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:48:21.610493 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:48:21.612191 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:48:21.615455 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:48:21.617898 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:48:21.623284 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:48:21.625479 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:48:21.630542 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:48:21.632283 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:48:21.633376 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:48:21.636091 systemd-journald[1402]: Time spent on flushing to /var/log/journal/ec24a15764a554bbafd3a8f27209484a is 48.486ms for 1190 entries. Dec 13 14:48:21.636091 systemd-journald[1402]: System Journal (/var/log/journal/ec24a15764a554bbafd3a8f27209484a) is 8.0M, max 195.6M, 187.6M free. Dec 13 14:48:21.749384 systemd-journald[1402]: Received client request to flush runtime journal. Dec 13 14:48:21.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.677129 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:48:21.678281 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:48:21.750554 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:48:21.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.758748 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:48:21.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.761035 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:48:21.856970 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:48:21.860073 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:48:21.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.878473 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:48:21.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.923239 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:48:21.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:21.925718 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:48:21.939454 udevadm[1451]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 14:48:22.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:22.615313 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:48:22.618087 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:48:22.996322 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:48:22.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:23.156226 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:48:23.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:23.158000 audit: BPF prog-id=18 op=LOAD Dec 13 14:48:23.158000 audit: BPF prog-id=19 op=LOAD Dec 13 14:48:23.158000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:48:23.158000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:48:23.159373 systemd[1]: Starting systemd-udevd.service... Dec 13 14:48:23.184831 systemd-udevd[1454]: Using default interface naming scheme 'v252'. Dec 13 14:48:23.376710 systemd[1]: Started systemd-udevd.service. Dec 13 14:48:23.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:23.378000 audit: BPF prog-id=20 op=LOAD Dec 13 14:48:23.381012 systemd[1]: Starting systemd-networkd.service... Dec 13 14:48:23.400000 audit: BPF prog-id=21 op=LOAD Dec 13 14:48:23.400000 audit: BPF prog-id=22 op=LOAD Dec 13 14:48:23.400000 audit: BPF prog-id=23 op=LOAD Dec 13 14:48:23.402436 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:48:23.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:23.453154 systemd[1]: Started systemd-userdbd.service. Dec 13 14:48:23.478761 (udev-worker)[1458]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:48:23.484063 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:48:23.573000 audit[1457]: AVC avc: denied { confidentiality } for pid=1457 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:48:23.573000 audit[1457]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=556c6f9acfb0 a1=337fc a2=7f057479abc5 a3=5 items=110 ppid=1454 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:23.573000 audit: CWD cwd="/" Dec 13 14:48:23.573000 audit: PATH item=0 name=(null) inode=1056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=1 name=(null) inode=14639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=2 name=(null) inode=14639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=3 name=(null) inode=14640 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=4 name=(null) inode=14639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=5 name=(null) inode=14641 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=6 name=(null) inode=14639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=7 name=(null) inode=14642 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=8 name=(null) inode=14642 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=9 name=(null) inode=14643 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=10 name=(null) inode=14642 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=11 name=(null) inode=14644 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=12 name=(null) inode=14642 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=13 name=(null) inode=14645 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=14 name=(null) inode=14642 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=15 name=(null) inode=14646 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=16 name=(null) inode=14642 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=17 name=(null) inode=14647 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=18 name=(null) inode=14639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=19 name=(null) inode=14648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=20 name=(null) inode=14648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=21 name=(null) inode=14649 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=22 name=(null) inode=14648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=23 name=(null) inode=14650 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=24 name=(null) inode=14648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=25 name=(null) inode=14651 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=26 name=(null) inode=14648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=27 name=(null) inode=14652 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=28 name=(null) inode=14648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=29 name=(null) inode=14653 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=30 name=(null) inode=14639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=31 name=(null) inode=14654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=32 name=(null) inode=14654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=33 name=(null) inode=14655 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=34 name=(null) inode=14654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=35 name=(null) inode=14656 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=36 name=(null) inode=14654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=37 name=(null) inode=14657 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=38 name=(null) inode=14654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=39 name=(null) inode=14658 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=40 name=(null) inode=14654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=41 name=(null) inode=14659 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=42 name=(null) inode=14639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=43 name=(null) inode=14660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=44 name=(null) inode=14660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=45 name=(null) inode=14661 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=46 name=(null) inode=14660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=47 name=(null) inode=14662 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=48 name=(null) inode=14660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=49 name=(null) inode=14663 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=50 name=(null) inode=14660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=51 name=(null) inode=14664 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=52 name=(null) inode=14660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=53 name=(null) inode=14665 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=54 name=(null) inode=1056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=55 name=(null) inode=14666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=56 name=(null) inode=14666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=57 name=(null) inode=14667 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=58 name=(null) inode=14666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=59 name=(null) inode=14668 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=60 name=(null) inode=14666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=61 name=(null) inode=14669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=62 name=(null) inode=14669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=63 name=(null) inode=14670 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=64 name=(null) inode=14669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=65 name=(null) inode=14671 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=66 name=(null) inode=14669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=67 name=(null) inode=14672 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=68 name=(null) inode=14669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=69 name=(null) inode=14673 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=70 name=(null) inode=14669 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=71 name=(null) inode=14674 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=72 name=(null) inode=14666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=73 name=(null) inode=14675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=74 name=(null) inode=14675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=75 name=(null) inode=14676 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=76 name=(null) inode=14675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=77 name=(null) inode=14677 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=78 name=(null) inode=14675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=79 name=(null) inode=14678 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=80 name=(null) inode=14675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=81 name=(null) inode=14679 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=82 name=(null) inode=14675 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=83 name=(null) inode=14680 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=84 name=(null) inode=14666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=85 name=(null) inode=14681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=86 name=(null) inode=14681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=87 name=(null) inode=14682 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=88 name=(null) inode=14681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=89 name=(null) inode=14683 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=90 name=(null) inode=14681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=91 name=(null) inode=14684 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=92 name=(null) inode=14681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=93 name=(null) inode=14685 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=94 name=(null) inode=14681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=95 name=(null) inode=14686 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=96 name=(null) inode=14666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=97 name=(null) inode=14687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=98 name=(null) inode=14687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=99 name=(null) inode=14688 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=100 name=(null) inode=14687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=101 name=(null) inode=14689 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=102 name=(null) inode=14687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=103 name=(null) inode=14690 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=104 name=(null) inode=14687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=105 name=(null) inode=14691 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=106 name=(null) inode=14687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=107 name=(null) inode=14692 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PATH item=109 name=(null) inode=14693 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:48:23.573000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:48:23.622415 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Dec 13 14:48:23.717424 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Dec 13 14:48:23.721417 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:48:23.721513 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 Dec 13 14:48:23.721565 kernel: ACPI: button: Sleep Button [SLPF] Dec 13 14:48:23.763415 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input5 Dec 13 14:48:23.773476 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:48:23.830489 systemd-networkd[1461]: lo: Link UP Dec 13 14:48:23.830501 systemd-networkd[1461]: lo: Gained carrier Dec 13 14:48:23.831041 systemd-networkd[1461]: Enumeration completed Dec 13 14:48:23.831176 systemd[1]: Started systemd-networkd.service. Dec 13 14:48:23.831185 systemd-networkd[1461]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:48:23.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:23.834375 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:48:23.838414 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:48:23.838652 systemd-networkd[1461]: eth0: Link UP Dec 13 14:48:23.838826 systemd-networkd[1461]: eth0: Gained carrier Dec 13 14:48:23.849598 systemd-networkd[1461]: eth0: DHCPv4 address 172.31.25.13/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 14:48:24.138428 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1459) Dec 13 14:48:24.231564 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:48:24.234128 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:48:24.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:24.237227 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:48:24.487239 lvm[1568]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:48:24.520716 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:48:24.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:24.521922 systemd[1]: Reached target cryptsetup.target. Dec 13 14:48:24.524460 systemd[1]: Starting lvm2-activation.service... Dec 13 14:48:24.532561 lvm[1569]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:48:24.556722 systemd[1]: Finished lvm2-activation.service. Dec 13 14:48:24.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:24.557781 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:48:24.558629 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:48:24.558651 systemd[1]: Reached target local-fs.target. Dec 13 14:48:24.559589 systemd[1]: Reached target machines.target. Dec 13 14:48:24.564289 systemd[1]: Starting ldconfig.service... Dec 13 14:48:24.568273 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:48:24.568363 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:48:24.570194 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:48:24.579911 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:48:24.585892 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:48:24.590317 systemd[1]: Starting systemd-sysext.service... Dec 13 14:48:24.606016 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1571 (bootctl) Dec 13 14:48:24.609983 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:48:24.629100 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:48:24.635973 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:48:24.636199 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:48:24.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:24.646418 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:48:24.650408 kernel: loop0: detected capacity change from 0 to 205544 Dec 13 14:48:25.282413 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:48:25.325459 systemd-networkd[1461]: eth0: Gained IPv6LL Dec 13 14:48:25.328430 kernel: loop1: detected capacity change from 0 to 205544 Dec 13 14:48:25.333226 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:48:25.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.346503 (sd-sysext)[1587]: Using extensions 'kubernetes'. Dec 13 14:48:25.347053 (sd-sysext)[1587]: Merged extensions into '/usr'. Dec 13 14:48:25.369079 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:48:25.370854 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:48:25.371721 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:48:25.376363 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:48:25.379534 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:48:25.383541 systemd[1]: Starting modprobe@loop.service... Dec 13 14:48:25.384548 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:48:25.384690 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:48:25.384806 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:48:25.388421 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:48:25.389592 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:48:25.389760 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:48:25.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.391297 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:48:25.391428 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:48:25.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.393434 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:48:25.393557 systemd[1]: Finished modprobe@loop.service. Dec 13 14:48:25.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.397162 systemd[1]: Finished systemd-sysext.service. Dec 13 14:48:25.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.400604 systemd[1]: Starting ensure-sysext.service... Dec 13 14:48:25.401710 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:48:25.401770 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:48:25.402864 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:48:25.411692 systemd[1]: Reloading. Dec 13 14:48:25.423066 systemd-tmpfiles[1594]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:48:25.440746 systemd-fsck[1583]: fsck.fat 4.2 (2021-01-31) Dec 13 14:48:25.440746 systemd-fsck[1583]: /dev/nvme0n1p1: 789 files, 119291/258078 clusters Dec 13 14:48:25.514193 /usr/lib/systemd/system-generators/torcx-generator[1615]: time="2024-12-13T14:48:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:48:25.514865 systemd-tmpfiles[1594]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:48:25.520194 systemd-tmpfiles[1594]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:48:25.520647 /usr/lib/systemd/system-generators/torcx-generator[1615]: time="2024-12-13T14:48:25Z" level=info msg="torcx already run" Dec 13 14:48:25.628803 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:48:25.628894 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:48:25.662939 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:48:25.759000 audit: BPF prog-id=24 op=LOAD Dec 13 14:48:25.759000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:48:25.759000 audit: BPF prog-id=25 op=LOAD Dec 13 14:48:25.759000 audit: BPF prog-id=26 op=LOAD Dec 13 14:48:25.759000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:48:25.759000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:48:25.760000 audit: BPF prog-id=27 op=LOAD Dec 13 14:48:25.760000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:48:25.764000 audit: BPF prog-id=28 op=LOAD Dec 13 14:48:25.764000 audit: BPF prog-id=29 op=LOAD Dec 13 14:48:25.764000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:48:25.764000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:48:25.765000 audit: BPF prog-id=30 op=LOAD Dec 13 14:48:25.765000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:48:25.765000 audit: BPF prog-id=31 op=LOAD Dec 13 14:48:25.766000 audit: BPF prog-id=32 op=LOAD Dec 13 14:48:25.766000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:48:25.766000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:48:25.770673 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:48:25.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.787498 systemd[1]: Mounting boot.mount... Dec 13 14:48:25.799133 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:48:25.799675 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:48:25.802178 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:48:25.805140 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:48:25.809373 systemd[1]: Starting modprobe@loop.service... Dec 13 14:48:25.811135 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:48:25.811344 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:48:25.811683 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:48:25.815326 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:48:25.815922 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:48:25.816128 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:48:25.816261 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:48:25.817573 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:48:25.818455 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:48:25.818627 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:48:25.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.823205 systemd[1]: Mounted boot.mount. Dec 13 14:48:25.824611 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:48:25.824888 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:48:25.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.827802 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:48:25.827990 systemd[1]: Finished modprobe@loop.service. Dec 13 14:48:25.838314 systemd[1]: Finished ensure-sysext.service. Dec 13 14:48:25.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.841578 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:48:25.841952 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:48:25.843566 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:48:25.846212 systemd[1]: Starting modprobe@drm.service... Dec 13 14:48:25.850241 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:48:25.853141 systemd[1]: Starting modprobe@loop.service... Dec 13 14:48:25.856117 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:48:25.856184 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:48:25.856339 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:48:25.857227 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:48:25.857419 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:48:25.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.858776 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:48:25.858922 systemd[1]: Finished modprobe@drm.service. Dec 13 14:48:25.861232 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:48:25.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.864178 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:48:25.864563 systemd[1]: Finished modprobe@loop.service. Dec 13 14:48:25.865798 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:48:25.865955 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:48:25.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:25.867131 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:48:25.867185 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:48:26.078050 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:48:26.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:26.080509 systemd[1]: Starting audit-rules.service... Dec 13 14:48:26.082805 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:48:26.085830 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:48:26.090000 audit: BPF prog-id=33 op=LOAD Dec 13 14:48:26.091639 systemd[1]: Starting systemd-resolved.service... Dec 13 14:48:26.093000 audit: BPF prog-id=34 op=LOAD Dec 13 14:48:26.094619 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:48:26.097056 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:48:26.111000 audit[1692]: SYSTEM_BOOT pid=1692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:48:26.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:26.116416 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:48:26.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:26.160782 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:48:26.196883 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:48:26.198985 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:48:26.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:26.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:26.200164 systemd[1]: Reached target time-set.target. Dec 13 14:48:26.201476 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:48:26.210823 systemd-resolved[1690]: Positive Trust Anchors: Dec 13 14:48:26.211145 systemd-resolved[1690]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:48:26.211220 systemd-resolved[1690]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:48:26.237680 systemd-resolved[1690]: Defaulting to hostname 'linux'. Dec 13 14:48:26.239797 systemd[1]: Started systemd-resolved.service. Dec 13 14:48:26.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:26.240984 systemd[1]: Reached target network.target. Dec 13 14:48:26.241775 systemd[1]: Reached target network-online.target. Dec 13 14:48:26.242607 systemd[1]: Reached target nss-lookup.target. Dec 13 14:48:27.308416 systemd-resolved[1690]: Clock change detected. Flushing caches. Dec 13 14:48:27.308596 systemd-timesyncd[1691]: Contacted time server 107.172.16.131:123 (0.flatcar.pool.ntp.org). Dec 13 14:48:27.308678 systemd-timesyncd[1691]: Initial clock synchronization to Fri 2024-12-13 14:48:27.308308 UTC. Dec 13 14:48:27.466332 kernel: kauditd_printk_skb: 219 callbacks suppressed Dec 13 14:48:27.466493 kernel: audit: type=1305 audit(1734101307.462:201): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:48:27.462000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:48:27.466662 augenrules[1709]: No rules Dec 13 14:48:27.470510 kernel: audit: type=1300 audit(1734101307.462:201): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffd04b2260 a2=420 a3=0 items=0 ppid=1686 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:27.462000 audit[1709]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffd04b2260 a2=420 a3=0 items=0 ppid=1686 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:27.473072 systemd[1]: Finished audit-rules.service. Dec 13 14:48:27.492702 kernel: audit: type=1327 audit(1734101307.462:201): proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:48:27.462000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:48:27.553588 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:48:27.554404 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:48:29.963208 ldconfig[1570]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:48:29.969455 systemd[1]: Finished ldconfig.service. Dec 13 14:48:29.971712 systemd[1]: Starting systemd-update-done.service... Dec 13 14:48:29.979576 systemd[1]: Finished systemd-update-done.service. Dec 13 14:48:29.980722 systemd[1]: Reached target sysinit.target. Dec 13 14:48:29.981664 systemd[1]: Started motdgen.path. Dec 13 14:48:29.982430 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:48:29.983671 systemd[1]: Started logrotate.timer. Dec 13 14:48:29.984532 systemd[1]: Started mdadm.timer. Dec 13 14:48:29.985314 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:48:29.986207 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:48:29.986251 systemd[1]: Reached target paths.target. Dec 13 14:48:29.987097 systemd[1]: Reached target timers.target. Dec 13 14:48:29.988521 systemd[1]: Listening on dbus.socket. Dec 13 14:48:29.991157 systemd[1]: Starting docker.socket... Dec 13 14:48:29.994665 systemd[1]: Listening on sshd.socket. Dec 13 14:48:29.995917 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:48:29.996468 systemd[1]: Listening on docker.socket. Dec 13 14:48:29.997505 systemd[1]: Reached target sockets.target. Dec 13 14:48:29.998705 systemd[1]: Reached target basic.target. Dec 13 14:48:29.999617 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:48:29.999652 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:48:30.002840 systemd[1]: Started amazon-ssm-agent.service. Dec 13 14:48:30.006843 systemd[1]: Starting containerd.service... Dec 13 14:48:30.011774 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 14:48:30.014319 systemd[1]: Starting dbus.service... Dec 13 14:48:30.017931 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:48:30.022149 systemd[1]: Starting extend-filesystems.service... Dec 13 14:48:30.024443 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:48:30.051073 jq[1721]: false Dec 13 14:48:30.029772 systemd[1]: Starting kubelet.service... Dec 13 14:48:30.032348 systemd[1]: Starting motdgen.service... Dec 13 14:48:30.035004 systemd[1]: Started nvidia.service. Dec 13 14:48:30.039661 systemd[1]: Starting prepare-helm.service... Dec 13 14:48:30.042591 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:48:30.045644 systemd[1]: Starting sshd-keygen.service... Dec 13 14:48:30.052580 systemd[1]: Starting systemd-logind.service... Dec 13 14:48:30.053676 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:48:30.053790 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:48:30.055267 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:48:30.056375 systemd[1]: Starting update-engine.service... Dec 13 14:48:30.062215 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:48:30.065480 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:48:30.065770 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:48:30.068255 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:48:30.068532 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:48:30.086042 jq[1734]: true Dec 13 14:48:30.103755 extend-filesystems[1722]: Found loop1 Dec 13 14:48:30.106593 jq[1740]: true Dec 13 14:48:30.121080 extend-filesystems[1722]: Found nvme0n1 Dec 13 14:48:30.122160 extend-filesystems[1722]: Found nvme0n1p1 Dec 13 14:48:30.123144 extend-filesystems[1722]: Found nvme0n1p2 Dec 13 14:48:30.124069 extend-filesystems[1722]: Found nvme0n1p3 Dec 13 14:48:30.124995 extend-filesystems[1722]: Found usr Dec 13 14:48:30.125886 extend-filesystems[1722]: Found nvme0n1p4 Dec 13 14:48:30.126803 extend-filesystems[1722]: Found nvme0n1p6 Dec 13 14:48:30.127754 extend-filesystems[1722]: Found nvme0n1p7 Dec 13 14:48:30.128753 extend-filesystems[1722]: Found nvme0n1p9 Dec 13 14:48:30.130724 extend-filesystems[1722]: Checking size of /dev/nvme0n1p9 Dec 13 14:48:30.166536 extend-filesystems[1722]: Resized partition /dev/nvme0n1p9 Dec 13 14:48:30.176349 extend-filesystems[1767]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:48:30.182284 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Dec 13 14:48:30.208539 tar[1737]: linux-amd64/helm Dec 13 14:48:30.217510 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:48:30.217737 systemd[1]: Finished motdgen.service. Dec 13 14:48:30.227185 dbus-daemon[1720]: [system] SELinux support is enabled Dec 13 14:48:30.227487 systemd[1]: Started dbus.service. Dec 13 14:48:30.231571 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:48:30.231617 systemd[1]: Reached target system-config.target. Dec 13 14:48:30.232610 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:48:30.232637 systemd[1]: Reached target user-config.target. Dec 13 14:48:30.243714 dbus-daemon[1720]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1461 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 14:48:30.252280 dbus-daemon[1720]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 14:48:30.253285 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Dec 13 14:48:30.429972 systemd[1]: Starting systemd-hostnamed.service... Dec 13 14:48:30.431378 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 14:48:30.433032 systemd-logind[1732]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:48:30.433058 systemd-logind[1732]: Watching system buttons on /dev/input/event2 (Sleep Button) Dec 13 14:48:30.433087 systemd-logind[1732]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:48:30.433764 systemd-logind[1732]: New seat seat0. Dec 13 14:48:30.549202 update_engine[1733]: I1213 14:48:30.526522 1733 main.cc:92] Flatcar Update Engine starting Dec 13 14:48:30.549541 extend-filesystems[1767]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Dec 13 14:48:30.549541 extend-filesystems[1767]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 14:48:30.549541 extend-filesystems[1767]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Dec 13 14:48:30.476398 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:48:30.555075 extend-filesystems[1722]: Resized filesystem in /dev/nvme0n1p9 Dec 13 14:48:30.476598 systemd[1]: Finished extend-filesystems.service. Dec 13 14:48:30.504148 systemd[1]: Started systemd-logind.service. Dec 13 14:48:30.562364 env[1768]: time="2024-12-13T14:48:30.557560522Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:48:30.559036 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:48:30.562754 bash[1760]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:48:30.570033 update_engine[1733]: I1213 14:48:30.569996 1733 update_check_scheduler.cc:74] Next update check in 8m25s Dec 13 14:48:30.570231 systemd[1]: Started update-engine.service. Dec 13 14:48:30.573812 systemd[1]: Started locksmithd.service. Dec 13 14:48:30.676830 env[1768]: time="2024-12-13T14:48:30.676772596Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:48:30.677194 env[1768]: time="2024-12-13T14:48:30.677169626Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:48:30.679332 env[1768]: time="2024-12-13T14:48:30.679288930Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:48:30.695493 env[1768]: time="2024-12-13T14:48:30.695433664Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:48:30.697790 env[1768]: time="2024-12-13T14:48:30.697754324Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:48:30.697940 env[1768]: time="2024-12-13T14:48:30.697917877Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:48:30.700553 env[1768]: time="2024-12-13T14:48:30.700504080Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:48:30.700701 env[1768]: time="2024-12-13T14:48:30.700682775Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:48:30.700939 env[1768]: time="2024-12-13T14:48:30.700908335Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:48:30.701423 env[1768]: time="2024-12-13T14:48:30.701392925Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:48:30.702134 env[1768]: time="2024-12-13T14:48:30.702104662Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:48:30.703331 env[1768]: time="2024-12-13T14:48:30.703306845Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:48:30.703564 env[1768]: time="2024-12-13T14:48:30.703541088Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:48:30.703693 env[1768]: time="2024-12-13T14:48:30.703675362Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:48:30.716174 env[1768]: time="2024-12-13T14:48:30.713470889Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:48:30.716174 env[1768]: time="2024-12-13T14:48:30.713524699Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:48:30.716174 env[1768]: time="2024-12-13T14:48:30.713548745Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:48:30.716174 env[1768]: time="2024-12-13T14:48:30.713607231Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:48:30.716174 env[1768]: time="2024-12-13T14:48:30.713628056Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:48:30.716174 env[1768]: time="2024-12-13T14:48:30.713705627Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:48:30.716174 env[1768]: time="2024-12-13T14:48:30.713727447Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:48:30.716174 env[1768]: time="2024-12-13T14:48:30.713748518Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:48:30.716174 env[1768]: time="2024-12-13T14:48:30.713766447Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:48:30.716174 env[1768]: time="2024-12-13T14:48:30.713790002Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:48:30.716174 env[1768]: time="2024-12-13T14:48:30.713807328Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:48:30.716174 env[1768]: time="2024-12-13T14:48:30.713824939Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:48:30.716174 env[1768]: time="2024-12-13T14:48:30.714089906Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:48:30.716174 env[1768]: time="2024-12-13T14:48:30.714197011Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:48:30.716816 env[1768]: time="2024-12-13T14:48:30.714701756Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:48:30.716816 env[1768]: time="2024-12-13T14:48:30.714741171Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:48:30.716816 env[1768]: time="2024-12-13T14:48:30.714762208Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:48:30.716816 env[1768]: time="2024-12-13T14:48:30.714825514Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:48:30.716816 env[1768]: time="2024-12-13T14:48:30.714844553Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:48:30.716816 env[1768]: time="2024-12-13T14:48:30.714862876Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:48:30.716816 env[1768]: time="2024-12-13T14:48:30.714934181Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:48:30.716816 env[1768]: time="2024-12-13T14:48:30.714952965Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:48:30.716816 env[1768]: time="2024-12-13T14:48:30.714972384Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:48:30.716816 env[1768]: time="2024-12-13T14:48:30.714989185Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:48:30.716816 env[1768]: time="2024-12-13T14:48:30.715006976Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:48:30.716816 env[1768]: time="2024-12-13T14:48:30.715036847Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:48:30.716816 env[1768]: time="2024-12-13T14:48:30.715176061Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:48:30.716816 env[1768]: time="2024-12-13T14:48:30.715195602Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:48:30.716816 env[1768]: time="2024-12-13T14:48:30.715214729Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:48:30.719678 env[1768]: time="2024-12-13T14:48:30.715232409Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:48:30.719678 env[1768]: time="2024-12-13T14:48:30.715255195Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:48:30.719678 env[1768]: time="2024-12-13T14:48:30.715356890Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:48:30.719678 env[1768]: time="2024-12-13T14:48:30.715381944Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:48:30.719678 env[1768]: time="2024-12-13T14:48:30.715426638Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:48:30.718294 systemd[1]: Started containerd.service. Dec 13 14:48:30.719961 env[1768]: time="2024-12-13T14:48:30.715708115Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:48:30.719961 env[1768]: time="2024-12-13T14:48:30.715785256Z" level=info msg="Connect containerd service" Dec 13 14:48:30.719961 env[1768]: time="2024-12-13T14:48:30.715825865Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:48:30.719961 env[1768]: time="2024-12-13T14:48:30.717678104Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:48:30.719961 env[1768]: time="2024-12-13T14:48:30.717987249Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:48:30.719961 env[1768]: time="2024-12-13T14:48:30.718032341Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:48:30.723326 env[1768]: time="2024-12-13T14:48:30.722556951Z" level=info msg="Start subscribing containerd event" Dec 13 14:48:30.723326 env[1768]: time="2024-12-13T14:48:30.722637513Z" level=info msg="Start recovering state" Dec 13 14:48:30.723326 env[1768]: time="2024-12-13T14:48:30.722728797Z" level=info msg="Start event monitor" Dec 13 14:48:30.723326 env[1768]: time="2024-12-13T14:48:30.722761886Z" level=info msg="Start snapshots syncer" Dec 13 14:48:30.723326 env[1768]: time="2024-12-13T14:48:30.722776378Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:48:30.723326 env[1768]: time="2024-12-13T14:48:30.722791792Z" level=info msg="Start streaming server" Dec 13 14:48:30.736446 amazon-ssm-agent[1717]: 2024/12/13 14:48:30 Failed to load instance info from vault. RegistrationKey does not exist. Dec 13 14:48:30.739036 env[1768]: time="2024-12-13T14:48:30.738993009Z" level=info msg="containerd successfully booted in 0.475868s" Dec 13 14:48:30.746289 amazon-ssm-agent[1717]: Initializing new seelog logger Dec 13 14:48:30.746289 amazon-ssm-agent[1717]: New Seelog Logger Creation Complete Dec 13 14:48:30.746289 amazon-ssm-agent[1717]: 2024/12/13 14:48:30 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 14:48:30.746289 amazon-ssm-agent[1717]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 14:48:30.746289 amazon-ssm-agent[1717]: 2024/12/13 14:48:30 processing appconfig overrides Dec 13 14:48:30.760531 dbus-daemon[1720]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 14:48:30.760723 systemd[1]: Started systemd-hostnamed.service. Dec 13 14:48:30.762975 dbus-daemon[1720]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1885 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 14:48:30.767387 systemd[1]: Starting polkit.service... Dec 13 14:48:30.784234 polkitd[1907]: Started polkitd version 121 Dec 13 14:48:30.949377 polkitd[1907]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 14:48:30.949921 polkitd[1907]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 14:48:30.952434 polkitd[1907]: Finished loading, compiling and executing 2 rules Dec 13 14:48:30.953247 dbus-daemon[1720]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 14:48:30.953579 systemd[1]: Started polkit.service. Dec 13 14:48:30.956177 polkitd[1907]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 14:48:30.991317 systemd-hostnamed[1885]: Hostname set to (transient) Dec 13 14:48:30.991450 systemd-resolved[1690]: System hostname changed to 'ip-172-31-25-13'. Dec 13 14:48:31.046740 coreos-metadata[1719]: Dec 13 14:48:31.046 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Dec 13 14:48:31.049550 coreos-metadata[1719]: Dec 13 14:48:31.049 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Dec 13 14:48:31.050430 coreos-metadata[1719]: Dec 13 14:48:31.050 INFO Fetch successful Dec 13 14:48:31.050558 coreos-metadata[1719]: Dec 13 14:48:31.050 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 14:48:31.051398 coreos-metadata[1719]: Dec 13 14:48:31.051 INFO Fetch successful Dec 13 14:48:31.056467 unknown[1719]: wrote ssh authorized keys file for user: core Dec 13 14:48:31.149169 update-ssh-keys[1916]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:48:31.149994 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 14:48:31.243975 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO Create new startup processor Dec 13 14:48:31.244098 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [LongRunningPluginsManager] registered plugins: {} Dec 13 14:48:31.244098 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO Initializing bookkeeping folders Dec 13 14:48:31.244098 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO removing the completed state files Dec 13 14:48:31.244098 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO Initializing bookkeeping folders for long running plugins Dec 13 14:48:31.244323 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Dec 13 14:48:31.244323 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO Initializing healthcheck folders for long running plugins Dec 13 14:48:31.244323 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO Initializing locations for inventory plugin Dec 13 14:48:31.244323 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO Initializing default location for custom inventory Dec 13 14:48:31.244323 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO Initializing default location for file inventory Dec 13 14:48:31.244323 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO Initializing default location for role inventory Dec 13 14:48:31.244323 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO Init the cloudwatchlogs publisher Dec 13 14:48:31.244323 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [instanceID=i-0ec3df1aa6a0b7069] Successfully loaded platform independent plugin aws:softwareInventory Dec 13 14:48:31.244323 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [instanceID=i-0ec3df1aa6a0b7069] Successfully loaded platform independent plugin aws:runPowerShellScript Dec 13 14:48:31.244323 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [instanceID=i-0ec3df1aa6a0b7069] Successfully loaded platform independent plugin aws:refreshAssociation Dec 13 14:48:31.244323 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [instanceID=i-0ec3df1aa6a0b7069] Successfully loaded platform independent plugin aws:runDocument Dec 13 14:48:31.244323 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [instanceID=i-0ec3df1aa6a0b7069] Successfully loaded platform independent plugin aws:updateSsmAgent Dec 13 14:48:31.244323 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [instanceID=i-0ec3df1aa6a0b7069] Successfully loaded platform independent plugin aws:configureDocker Dec 13 14:48:31.244323 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [instanceID=i-0ec3df1aa6a0b7069] Successfully loaded platform independent plugin aws:runDockerAction Dec 13 14:48:31.244323 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [instanceID=i-0ec3df1aa6a0b7069] Successfully loaded platform independent plugin aws:configurePackage Dec 13 14:48:31.244323 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [instanceID=i-0ec3df1aa6a0b7069] Successfully loaded platform independent plugin aws:downloadContent Dec 13 14:48:31.244323 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [instanceID=i-0ec3df1aa6a0b7069] Successfully loaded platform dependent plugin aws:runShellScript Dec 13 14:48:31.244323 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Dec 13 14:48:31.244323 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO OS: linux, Arch: amd64 Dec 13 14:48:31.250868 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [MessageGatewayService] Starting session document processing engine... Dec 13 14:48:31.251772 amazon-ssm-agent[1717]: datastore file /var/lib/amazon/ssm/i-0ec3df1aa6a0b7069/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Dec 13 14:48:31.351046 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [MessageGatewayService] [EngineProcessor] Starting Dec 13 14:48:31.445346 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Dec 13 14:48:31.540491 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0ec3df1aa6a0b7069, requestId: 0a5bce8b-9ecb-44e7-9a61-fdaf67bd2325 Dec 13 14:48:31.635352 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [MessagingDeliveryService] Starting document processing engine... Dec 13 14:48:31.730199 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [MessagingDeliveryService] [EngineProcessor] Starting Dec 13 14:48:31.825339 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Dec 13 14:48:31.920568 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [MessagingDeliveryService] Starting message polling Dec 13 14:48:31.959396 tar[1737]: linux-amd64/LICENSE Dec 13 14:48:31.959917 tar[1737]: linux-amd64/README.md Dec 13 14:48:31.970702 systemd[1]: Finished prepare-helm.service. Dec 13 14:48:32.000175 locksmithd[1894]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:48:32.016041 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [MessagingDeliveryService] Starting send replies to MDS Dec 13 14:48:32.112100 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [instanceID=i-0ec3df1aa6a0b7069] Starting association polling Dec 13 14:48:32.164618 systemd[1]: Started kubelet.service. Dec 13 14:48:32.209376 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Dec 13 14:48:32.305838 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [MessagingDeliveryService] [Association] Launching response handler Dec 13 14:48:32.402177 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Dec 13 14:48:32.498636 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Dec 13 14:48:32.595317 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Dec 13 14:48:32.693771 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [OfflineService] Starting document processing engine... Dec 13 14:48:32.792314 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [OfflineService] [EngineProcessor] Starting Dec 13 14:48:32.889562 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [OfflineService] [EngineProcessor] Initial processing Dec 13 14:48:32.977706 kubelet[1927]: E1213 14:48:32.977594 1927 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:48:32.980099 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:48:32.980282 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:48:32.980607 systemd[1]: kubelet.service: Consumed 1.201s CPU time. Dec 13 14:48:32.986994 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [OfflineService] Starting message polling Dec 13 14:48:33.085508 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [OfflineService] Starting send replies to MDS Dec 13 14:48:33.183461 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [LongRunningPluginsManager] starting long running plugin manager Dec 13 14:48:33.281635 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Dec 13 14:48:33.380035 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [HealthCheck] HealthCheck reporting agent health. Dec 13 14:48:33.478499 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [MessageGatewayService] listening reply. Dec 13 14:48:33.577217 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Dec 13 14:48:33.676025 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [StartupProcessor] Executing startup processor tasks Dec 13 14:48:33.775212 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Dec 13 14:48:33.874739 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Dec 13 14:48:33.974108 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.6 Dec 13 14:48:34.073720 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0ec3df1aa6a0b7069?role=subscribe&stream=input Dec 13 14:48:34.107128 sshd_keygen[1744]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:48:34.136187 systemd[1]: Finished sshd-keygen.service. Dec 13 14:48:34.139603 systemd[1]: Starting issuegen.service... Dec 13 14:48:34.147170 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:48:34.147396 systemd[1]: Finished issuegen.service. Dec 13 14:48:34.150407 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:48:34.159009 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:48:34.162331 systemd[1]: Started getty@tty1.service. Dec 13 14:48:34.165172 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:48:34.166450 systemd[1]: Reached target getty.target. Dec 13 14:48:34.167411 systemd[1]: Reached target multi-user.target. Dec 13 14:48:34.171880 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:48:34.174286 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0ec3df1aa6a0b7069?role=subscribe&stream=input Dec 13 14:48:34.182192 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:48:34.182470 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:48:34.183840 systemd[1]: Startup finished in 765ms (kernel) + 14.025s (initrd) + 30.485s (userspace) = 45.275s. Dec 13 14:48:34.273551 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [MessageGatewayService] Starting receiving message from control channel Dec 13 14:48:34.373792 amazon-ssm-agent[1717]: 2024-12-13 14:48:31 INFO [MessageGatewayService] [EngineProcessor] Initial processing Dec 13 14:48:35.554863 systemd[1]: Created slice system-sshd.slice. Dec 13 14:48:35.557628 systemd[1]: Started sshd@0-172.31.25.13:22-139.178.89.65:53830.service. Dec 13 14:48:35.863583 sshd[1948]: Accepted publickey for core from 139.178.89.65 port 53830 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:48:35.868597 sshd[1948]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:48:35.883213 systemd[1]: Created slice user-500.slice. Dec 13 14:48:35.885989 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:48:35.893334 systemd-logind[1732]: New session 1 of user core. Dec 13 14:48:35.898493 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:48:35.900669 systemd[1]: Starting user@500.service... Dec 13 14:48:35.905183 (systemd)[1951]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:48:36.032200 systemd[1951]: Queued start job for default target default.target. Dec 13 14:48:36.032901 systemd[1951]: Reached target paths.target. Dec 13 14:48:36.032933 systemd[1951]: Reached target sockets.target. Dec 13 14:48:36.032951 systemd[1951]: Reached target timers.target. Dec 13 14:48:36.032967 systemd[1951]: Reached target basic.target. Dec 13 14:48:36.033020 systemd[1951]: Reached target default.target. Dec 13 14:48:36.033059 systemd[1951]: Startup finished in 120ms. Dec 13 14:48:36.033745 systemd[1]: Started user@500.service. Dec 13 14:48:36.035208 systemd[1]: Started session-1.scope. Dec 13 14:48:36.184014 systemd[1]: Started sshd@1-172.31.25.13:22-139.178.89.65:53832.service. Dec 13 14:48:36.354047 sshd[1960]: Accepted publickey for core from 139.178.89.65 port 53832 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:48:36.355641 sshd[1960]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:48:36.360844 systemd-logind[1732]: New session 2 of user core. Dec 13 14:48:36.361544 systemd[1]: Started session-2.scope. Dec 13 14:48:36.490552 sshd[1960]: pam_unix(sshd:session): session closed for user core Dec 13 14:48:36.494126 systemd[1]: sshd@1-172.31.25.13:22-139.178.89.65:53832.service: Deactivated successfully. Dec 13 14:48:36.495027 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:48:36.495803 systemd-logind[1732]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:48:36.496680 systemd-logind[1732]: Removed session 2. Dec 13 14:48:36.521403 systemd[1]: Started sshd@2-172.31.25.13:22-139.178.89.65:53846.service. Dec 13 14:48:36.688426 sshd[1966]: Accepted publickey for core from 139.178.89.65 port 53846 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:48:36.690714 sshd[1966]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:48:36.699752 systemd-logind[1732]: New session 3 of user core. Dec 13 14:48:36.700331 systemd[1]: Started session-3.scope. Dec 13 14:48:36.820049 sshd[1966]: pam_unix(sshd:session): session closed for user core Dec 13 14:48:36.825010 systemd[1]: sshd@2-172.31.25.13:22-139.178.89.65:53846.service: Deactivated successfully. Dec 13 14:48:36.826433 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:48:36.827309 systemd-logind[1732]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:48:36.828702 systemd-logind[1732]: Removed session 3. Dec 13 14:48:36.847426 systemd[1]: Started sshd@3-172.31.25.13:22-139.178.89.65:53858.service. Dec 13 14:48:37.014170 sshd[1972]: Accepted publickey for core from 139.178.89.65 port 53858 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:48:37.015817 sshd[1972]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:48:37.025212 systemd-logind[1732]: New session 4 of user core. Dec 13 14:48:37.026200 systemd[1]: Started session-4.scope. Dec 13 14:48:37.159545 sshd[1972]: pam_unix(sshd:session): session closed for user core Dec 13 14:48:37.163997 systemd[1]: sshd@3-172.31.25.13:22-139.178.89.65:53858.service: Deactivated successfully. Dec 13 14:48:37.164894 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:48:37.165550 systemd-logind[1732]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:48:37.166507 systemd-logind[1732]: Removed session 4. Dec 13 14:48:37.189063 systemd[1]: Started sshd@4-172.31.25.13:22-139.178.89.65:53868.service. Dec 13 14:48:37.351686 sshd[1978]: Accepted publickey for core from 139.178.89.65 port 53868 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:48:37.353749 sshd[1978]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:48:37.361793 systemd[1]: Started session-5.scope. Dec 13 14:48:37.362337 systemd-logind[1732]: New session 5 of user core. Dec 13 14:48:37.609407 sudo[1981]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:48:37.610235 sudo[1981]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:48:37.620694 dbus-daemon[1720]: \xd0\xcd/\x89\xdeU: received setenforce notice (enforcing=155823824) Dec 13 14:48:37.622974 sudo[1981]: pam_unix(sudo:session): session closed for user root Dec 13 14:48:37.646372 sshd[1978]: pam_unix(sshd:session): session closed for user core Dec 13 14:48:37.649824 systemd[1]: sshd@4-172.31.25.13:22-139.178.89.65:53868.service: Deactivated successfully. Dec 13 14:48:37.650712 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:48:37.651518 systemd-logind[1732]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:48:37.652760 systemd-logind[1732]: Removed session 5. Dec 13 14:48:37.672569 systemd[1]: Started sshd@5-172.31.25.13:22-139.178.89.65:53884.service. Dec 13 14:48:37.835936 sshd[1985]: Accepted publickey for core from 139.178.89.65 port 53884 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:48:37.837414 sshd[1985]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:48:37.841958 systemd-logind[1732]: New session 6 of user core. Dec 13 14:48:37.842625 systemd[1]: Started session-6.scope. Dec 13 14:48:37.947653 sudo[1989]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:48:37.947953 sudo[1989]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:48:37.951918 sudo[1989]: pam_unix(sudo:session): session closed for user root Dec 13 14:48:37.957774 sudo[1988]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:48:37.958186 sudo[1988]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:48:37.969034 systemd[1]: Stopping audit-rules.service... Dec 13 14:48:37.969000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:48:37.983009 kernel: audit: type=1305 audit(1734101317.969:202): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:48:37.983109 kernel: audit: type=1300 audit(1734101317.969:202): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeeabcd8b0 a2=420 a3=0 items=0 ppid=1 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:37.983142 kernel: audit: type=1327 audit(1734101317.969:202): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:48:37.969000 audit[1992]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeeabcd8b0 a2=420 a3=0 items=0 ppid=1 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:37.969000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:48:37.983347 auditctl[1992]: No rules Dec 13 14:48:37.979578 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:48:37.979872 systemd[1]: Stopped audit-rules.service. Dec 13 14:48:37.981922 systemd[1]: Starting audit-rules.service... Dec 13 14:48:37.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:37.988514 kernel: audit: type=1131 audit(1734101317.978:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:38.002863 augenrules[2009]: No rules Dec 13 14:48:38.012544 kernel: audit: type=1130 audit(1734101318.002:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:38.012640 kernel: audit: type=1106 audit(1734101318.003:205): pid=1988 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:48:38.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:38.003000 audit[1988]: USER_END pid=1988 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:48:38.003689 systemd[1]: Finished audit-rules.service. Dec 13 14:48:38.004800 sudo[1988]: pam_unix(sudo:session): session closed for user root Dec 13 14:48:38.003000 audit[1988]: CRED_DISP pid=1988 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:48:38.016860 kernel: audit: type=1104 audit(1734101318.003:206): pid=1988 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:48:38.027372 sshd[1985]: pam_unix(sshd:session): session closed for user core Dec 13 14:48:38.027000 audit[1985]: USER_END pid=1985 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:48:38.030808 systemd[1]: sshd@5-172.31.25.13:22-139.178.89.65:53884.service: Deactivated successfully. Dec 13 14:48:38.032281 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:48:38.033761 systemd-logind[1732]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:48:38.027000 audit[1985]: CRED_DISP pid=1985 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:48:38.035338 systemd-logind[1732]: Removed session 6. Dec 13 14:48:38.039660 kernel: audit: type=1106 audit(1734101318.027:207): pid=1985 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:48:38.039711 kernel: audit: type=1104 audit(1734101318.027:208): pid=1985 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:48:38.039751 kernel: audit: type=1131 audit(1734101318.029:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.25.13:22-139.178.89.65:53884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:38.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.25.13:22-139.178.89.65:53884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:38.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.25.13:22-139.178.89.65:48674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:38.051822 systemd[1]: Started sshd@6-172.31.25.13:22-139.178.89.65:48674.service. Dec 13 14:48:38.208000 audit[2015]: USER_ACCT pid=2015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:48:38.209976 sshd[2015]: Accepted publickey for core from 139.178.89.65 port 48674 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:48:38.211000 audit[2015]: CRED_ACQ pid=2015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:48:38.211000 audit[2015]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa8cec1b0 a2=3 a3=0 items=0 ppid=1 pid=2015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:38.211000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:48:38.213093 sshd[2015]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:48:38.218257 systemd[1]: Started session-7.scope. Dec 13 14:48:38.219184 systemd-logind[1732]: New session 7 of user core. Dec 13 14:48:38.223000 audit[2015]: USER_START pid=2015 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:48:38.225000 audit[2017]: CRED_ACQ pid=2017 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:48:38.320000 audit[2018]: USER_ACCT pid=2018 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:48:38.320000 audit[2018]: CRED_REFR pid=2018 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:48:38.321752 sudo[2018]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:48:38.322061 sudo[2018]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:48:38.325000 audit[2018]: USER_START pid=2018 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:48:38.382518 systemd[1]: Starting docker.service... Dec 13 14:48:38.445180 env[2028]: time="2024-12-13T14:48:38.445138253Z" level=info msg="Starting up" Dec 13 14:48:38.446841 env[2028]: time="2024-12-13T14:48:38.446802484Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:48:38.446841 env[2028]: time="2024-12-13T14:48:38.446828010Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:48:38.446997 env[2028]: time="2024-12-13T14:48:38.446858325Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:48:38.446997 env[2028]: time="2024-12-13T14:48:38.446871648Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:48:38.448934 env[2028]: time="2024-12-13T14:48:38.448888837Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:48:38.448934 env[2028]: time="2024-12-13T14:48:38.448918402Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:48:38.449081 env[2028]: time="2024-12-13T14:48:38.448937157Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:48:38.449081 env[2028]: time="2024-12-13T14:48:38.448949326Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:48:39.013135 env[2028]: time="2024-12-13T14:48:39.013087011Z" level=info msg="Loading containers: start." Dec 13 14:48:39.235000 audit[2058]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2058 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.235000 audit[2058]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffff37d3720 a2=0 a3=7ffff37d370c items=0 ppid=2028 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.235000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:48:39.238000 audit[2060]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2060 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.238000 audit[2060]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc566d2e00 a2=0 a3=7ffc566d2dec items=0 ppid=2028 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.238000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:48:39.241000 audit[2062]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2062 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.241000 audit[2062]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc15561940 a2=0 a3=7ffc1556192c items=0 ppid=2028 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.241000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:48:39.247000 audit[2064]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2064 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.247000 audit[2064]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd5f4392d0 a2=0 a3=7ffd5f4392bc items=0 ppid=2028 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.247000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:48:39.250000 audit[2066]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2066 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.250000 audit[2066]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe5464e240 a2=0 a3=7ffe5464e22c items=0 ppid=2028 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.250000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:48:39.273000 audit[2071]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2071 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.273000 audit[2071]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffda9282200 a2=0 a3=7ffda92821ec items=0 ppid=2028 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.273000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:48:39.284000 audit[2073]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2073 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.284000 audit[2073]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeb87d0640 a2=0 a3=7ffeb87d062c items=0 ppid=2028 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.284000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:48:39.286000 audit[2075]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2075 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.286000 audit[2075]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd16e7d1f0 a2=0 a3=7ffd16e7d1dc items=0 ppid=2028 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.286000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:48:39.289000 audit[2077]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2077 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.289000 audit[2077]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe1a0fb8b0 a2=0 a3=7ffe1a0fb89c items=0 ppid=2028 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.289000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:48:39.301000 audit[2081]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2081 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.301000 audit[2081]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff053e20f0 a2=0 a3=7fff053e20dc items=0 ppid=2028 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.301000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:48:39.306000 audit[2082]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2082 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.306000 audit[2082]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff2ebf63d0 a2=0 a3=7fff2ebf63bc items=0 ppid=2028 pid=2082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.306000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:48:39.433287 kernel: Initializing XFRM netlink socket Dec 13 14:48:39.622457 env[2028]: time="2024-12-13T14:48:39.622355996Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:48:39.624116 (udev-worker)[2038]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:48:39.677000 audit[2090]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2090 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.677000 audit[2090]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc15310330 a2=0 a3=7ffc1531031c items=0 ppid=2028 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.677000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:48:39.728000 audit[2093]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2093 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.728000 audit[2093]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff7bc51710 a2=0 a3=7fff7bc516fc items=0 ppid=2028 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.728000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:48:39.732000 audit[2096]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2096 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.732000 audit[2096]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc54c38120 a2=0 a3=7ffc54c3810c items=0 ppid=2028 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.732000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:48:39.735000 audit[2098]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2098 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.735000 audit[2098]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc08818950 a2=0 a3=7ffc0881893c items=0 ppid=2028 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.735000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:48:39.738000 audit[2100]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2100 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.738000 audit[2100]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc10f18e20 a2=0 a3=7ffc10f18e0c items=0 ppid=2028 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.738000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:48:39.741000 audit[2102]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2102 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.741000 audit[2102]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fffa12f3c50 a2=0 a3=7fffa12f3c3c items=0 ppid=2028 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.741000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:48:39.744000 audit[2104]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2104 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.744000 audit[2104]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffdedefbdd0 a2=0 a3=7ffdedefbdbc items=0 ppid=2028 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.744000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:48:39.760000 audit[2107]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2107 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.760000 audit[2107]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffed098bbc0 a2=0 a3=7ffed098bbac items=0 ppid=2028 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.760000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:48:39.764000 audit[2109]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.764000 audit[2109]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffce6def030 a2=0 a3=7ffce6def01c items=0 ppid=2028 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.764000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:48:39.768000 audit[2111]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2111 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.768000 audit[2111]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fffa84c6d40 a2=0 a3=7fffa84c6d2c items=0 ppid=2028 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.768000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:48:39.770000 audit[2113]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2113 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.770000 audit[2113]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc0b514f20 a2=0 a3=7ffc0b514f0c items=0 ppid=2028 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.770000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:48:39.772666 systemd-networkd[1461]: docker0: Link UP Dec 13 14:48:39.786000 audit[2117]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2117 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.786000 audit[2117]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd9124edf0 a2=0 a3=7ffd9124eddc items=0 ppid=2028 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.786000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:48:39.791000 audit[2118]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2118 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:48:39.791000 audit[2118]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe6cb28310 a2=0 a3=7ffe6cb282fc items=0 ppid=2028 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:48:39.791000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:48:39.793559 env[2028]: time="2024-12-13T14:48:39.793520676Z" level=info msg="Loading containers: done." Dec 13 14:48:39.826496 env[2028]: time="2024-12-13T14:48:39.826205572Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:48:39.827205 env[2028]: time="2024-12-13T14:48:39.827177968Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:48:39.827621 env[2028]: time="2024-12-13T14:48:39.827602755Z" level=info msg="Daemon has completed initialization" Dec 13 14:48:39.854835 systemd[1]: Started docker.service. Dec 13 14:48:39.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:39.875496 env[2028]: time="2024-12-13T14:48:39.875236905Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:48:40.874670 env[1768]: time="2024-12-13T14:48:40.874624580Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\"" Dec 13 14:48:41.604030 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount481373860.mount: Deactivated successfully. Dec 13 14:48:43.157148 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:48:43.171425 kernel: kauditd_printk_skb: 84 callbacks suppressed Dec 13 14:48:43.171517 kernel: audit: type=1130 audit(1734101323.156:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:43.171564 kernel: audit: type=1131 audit(1734101323.156:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:43.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:43.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:43.157445 systemd[1]: Stopped kubelet.service. Dec 13 14:48:43.157515 systemd[1]: kubelet.service: Consumed 1.201s CPU time. Dec 13 14:48:43.159347 systemd[1]: Starting kubelet.service... Dec 13 14:48:43.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:43.867572 systemd[1]: Started kubelet.service. Dec 13 14:48:43.872353 kernel: audit: type=1130 audit(1734101323.866:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:43.973178 kubelet[2155]: E1213 14:48:43.973138 2155 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:48:43.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:48:43.978848 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:48:43.979077 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:48:43.983299 kernel: audit: type=1131 audit(1734101323.978:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:48:44.689860 env[1768]: time="2024-12-13T14:48:44.689808220Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:44.692617 env[1768]: time="2024-12-13T14:48:44.692569507Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:44.694877 env[1768]: time="2024-12-13T14:48:44.694829695Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:44.697138 env[1768]: time="2024-12-13T14:48:44.697101816Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ace6a943b058439bd6daeb74f152e7c36e6fc0b5e481cdff9364cd6ca0473e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:44.697954 env[1768]: time="2024-12-13T14:48:44.697922018Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\" returns image reference \"sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e\"" Dec 13 14:48:44.700165 env[1768]: time="2024-12-13T14:48:44.700133214Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\"" Dec 13 14:48:45.150171 amazon-ssm-agent[1717]: 2024-12-13 14:48:45 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Dec 13 14:48:47.985747 env[1768]: time="2024-12-13T14:48:47.985692111Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:48.017394 env[1768]: time="2024-12-13T14:48:48.017346611Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:48.059039 env[1768]: time="2024-12-13T14:48:48.058977692Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:48.094100 env[1768]: time="2024-12-13T14:48:48.094053678Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4bd1d4a449e7a1a4f375bd7c71abf48a95f8949b38f725ded255077329f21f7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:48.095305 env[1768]: time="2024-12-13T14:48:48.095252072Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\" returns image reference \"sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079\"" Dec 13 14:48:48.096012 env[1768]: time="2024-12-13T14:48:48.095982912Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\"" Dec 13 14:48:50.345088 env[1768]: time="2024-12-13T14:48:50.345046443Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:50.366645 env[1768]: time="2024-12-13T14:48:50.366597501Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:50.384773 env[1768]: time="2024-12-13T14:48:50.384680211Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:50.395984 env[1768]: time="2024-12-13T14:48:50.395940654Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:1a3081cb7d21763d22eb2c0781cc462d89f501ed523ad558dea1226f128fbfdd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:50.397040 env[1768]: time="2024-12-13T14:48:50.397001016Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\" returns image reference \"sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674\"" Dec 13 14:48:50.397682 env[1768]: time="2024-12-13T14:48:50.397654243Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 13 14:48:51.821434 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2173031812.mount: Deactivated successfully. Dec 13 14:48:52.808302 env[1768]: time="2024-12-13T14:48:52.808234644Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:52.811169 env[1768]: time="2024-12-13T14:48:52.811131015Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:52.813431 env[1768]: time="2024-12-13T14:48:52.813395337Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:52.815282 env[1768]: time="2024-12-13T14:48:52.815240330Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:52.815717 env[1768]: time="2024-12-13T14:48:52.815684796Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300\"" Dec 13 14:48:52.816226 env[1768]: time="2024-12-13T14:48:52.816203046Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:48:53.438837 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1746187079.mount: Deactivated successfully. Dec 13 14:48:54.157101 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:48:54.165881 kernel: audit: type=1130 audit(1734101334.156:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:54.166006 kernel: audit: type=1131 audit(1734101334.156:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:54.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:54.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:54.157369 systemd[1]: Stopped kubelet.service. Dec 13 14:48:54.159269 systemd[1]: Starting kubelet.service... Dec 13 14:48:54.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:54.889931 systemd[1]: Started kubelet.service. Dec 13 14:48:54.895514 kernel: audit: type=1130 audit(1734101334.889:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:48:54.947050 kubelet[2165]: E1213 14:48:54.947017 2165 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:48:54.948125 env[1768]: time="2024-12-13T14:48:54.948081275Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:54.950126 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:48:54.950340 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:48:54.955680 kernel: audit: type=1131 audit(1734101334.949:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:48:54.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:48:54.959568 env[1768]: time="2024-12-13T14:48:54.959510863Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:54.963595 env[1768]: time="2024-12-13T14:48:54.963545520Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:54.967393 env[1768]: time="2024-12-13T14:48:54.967360777Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:54.968043 env[1768]: time="2024-12-13T14:48:54.967969717Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 14:48:54.968627 env[1768]: time="2024-12-13T14:48:54.968541253Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Dec 13 14:48:55.722855 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3704897758.mount: Deactivated successfully. Dec 13 14:48:55.731058 env[1768]: time="2024-12-13T14:48:55.731011600Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:55.734635 env[1768]: time="2024-12-13T14:48:55.734591234Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:55.736611 env[1768]: time="2024-12-13T14:48:55.736567553Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:55.743684 env[1768]: time="2024-12-13T14:48:55.743637614Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:48:55.743949 env[1768]: time="2024-12-13T14:48:55.743919030Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Dec 13 14:48:55.745133 env[1768]: time="2024-12-13T14:48:55.745107187Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" Dec 13 14:48:56.335625 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2981137576.mount: Deactivated successfully. Dec 13 14:49:00.156845 env[1768]: time="2024-12-13T14:49:00.156794855Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:00.160642 env[1768]: time="2024-12-13T14:49:00.160605712Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:00.163869 env[1768]: time="2024-12-13T14:49:00.163829316Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:00.173409 env[1768]: time="2024-12-13T14:49:00.173369201Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:00.174293 env[1768]: time="2024-12-13T14:49:00.174240082Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" Dec 13 14:49:01.001581 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 14:49:01.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.007281 kernel: audit: type=1131 audit(1734101341.000:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:01.027293 kernel: audit: type=1334 audit(1734101341.023:253): prog-id=40 op=UNLOAD Dec 13 14:49:01.027499 kernel: audit: type=1334 audit(1734101341.023:254): prog-id=39 op=UNLOAD Dec 13 14:49:01.023000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:49:01.023000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:49:01.030104 kernel: audit: type=1334 audit(1734101341.023:255): prog-id=38 op=UNLOAD Dec 13 14:49:01.023000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:49:03.440832 systemd[1]: Stopped kubelet.service. Dec 13 14:49:03.448124 kernel: audit: type=1130 audit(1734101343.440:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:03.448239 kernel: audit: type=1131 audit(1734101343.442:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:03.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:03.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:03.449057 systemd[1]: Starting kubelet.service... Dec 13 14:49:03.481206 systemd[1]: Reloading. Dec 13 14:49:03.637979 /usr/lib/systemd/system-generators/torcx-generator[2215]: time="2024-12-13T14:49:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:49:03.638015 /usr/lib/systemd/system-generators/torcx-generator[2215]: time="2024-12-13T14:49:03Z" level=info msg="torcx already run" Dec 13 14:49:03.755383 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:49:03.755405 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:49:03.778836 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:49:03.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884463 kernel: audit: type=1400 audit(1734101343.876:258): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884598 kernel: audit: type=1400 audit(1734101343.876:259): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.892964 kernel: audit: type=1400 audit(1734101343.884:260): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.893125 kernel: audit: type=1400 audit(1734101343.884:261): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit: BPF prog-id=43 op=LOAD Dec 13 14:49:03.884000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit: BPF prog-id=44 op=LOAD Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.884000 audit: BPF prog-id=45 op=LOAD Dec 13 14:49:03.884000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:49:03.884000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:49:03.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.887000 audit: BPF prog-id=46 op=LOAD Dec 13 14:49:03.887000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:49:03.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.891000 audit: BPF prog-id=47 op=LOAD Dec 13 14:49:03.891000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:49:03.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.892000 audit: BPF prog-id=48 op=LOAD Dec 13 14:49:03.892000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:49:03.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit: BPF prog-id=49 op=LOAD Dec 13 14:49:03.897000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit: BPF prog-id=50 op=LOAD Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.897000 audit: BPF prog-id=51 op=LOAD Dec 13 14:49:03.897000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:49:03.897000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit: BPF prog-id=52 op=LOAD Dec 13 14:49:03.900000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit: BPF prog-id=53 op=LOAD Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.900000 audit: BPF prog-id=54 op=LOAD Dec 13 14:49:03.900000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:49:03.900000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:49:03.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.902000 audit: BPF prog-id=55 op=LOAD Dec 13 14:49:03.902000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:49:03.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.903000 audit: BPF prog-id=56 op=LOAD Dec 13 14:49:03.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:03.903000 audit: BPF prog-id=57 op=LOAD Dec 13 14:49:03.903000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:49:03.903000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:49:03.934795 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 14:49:03.934898 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 14:49:03.935226 systemd[1]: Stopped kubelet.service. Dec 13 14:49:03.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:49:03.937460 systemd[1]: Starting kubelet.service... Dec 13 14:49:04.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:04.283191 systemd[1]: Started kubelet.service. Dec 13 14:49:04.357887 kubelet[2272]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:49:04.358326 kubelet[2272]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:49:04.358398 kubelet[2272]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:49:04.358650 kubelet[2272]: I1213 14:49:04.358619 2272 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:49:04.866402 kubelet[2272]: I1213 14:49:04.866361 2272 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 14:49:04.866402 kubelet[2272]: I1213 14:49:04.866393 2272 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:49:04.866800 kubelet[2272]: I1213 14:49:04.866777 2272 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 14:49:04.916225 kubelet[2272]: E1213 14:49:04.916183 2272 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://172.31.25.13:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 172.31.25.13:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:49:04.916225 kubelet[2272]: I1213 14:49:04.916234 2272 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:49:04.934497 kubelet[2272]: E1213 14:49:04.934460 2272 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 14:49:04.934497 kubelet[2272]: I1213 14:49:04.934493 2272 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 14:49:04.939801 kubelet[2272]: I1213 14:49:04.939772 2272 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:49:04.939939 kubelet[2272]: I1213 14:49:04.939888 2272 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 14:49:04.940097 kubelet[2272]: I1213 14:49:04.940043 2272 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:49:04.940401 kubelet[2272]: I1213 14:49:04.940094 2272 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-25-13","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 14:49:04.940588 kubelet[2272]: I1213 14:49:04.940414 2272 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:49:04.940588 kubelet[2272]: I1213 14:49:04.940429 2272 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 14:49:04.940588 kubelet[2272]: I1213 14:49:04.940559 2272 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:49:04.946460 kubelet[2272]: I1213 14:49:04.946432 2272 kubelet.go:408] "Attempting to sync node with API server" Dec 13 14:49:04.946460 kubelet[2272]: I1213 14:49:04.946467 2272 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:49:04.946609 kubelet[2272]: I1213 14:49:04.946504 2272 kubelet.go:314] "Adding apiserver pod source" Dec 13 14:49:04.946609 kubelet[2272]: I1213 14:49:04.946520 2272 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:49:04.960314 kubelet[2272]: W1213 14:49:04.960228 2272 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.25.13:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-13&limit=500&resourceVersion=0": dial tcp 172.31.25.13:6443: connect: connection refused Dec 13 14:49:04.960633 kubelet[2272]: E1213 14:49:04.960605 2272 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.31.25.13:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-13&limit=500&resourceVersion=0\": dial tcp 172.31.25.13:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:49:04.963339 kubelet[2272]: W1213 14:49:04.963285 2272 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.25.13:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.31.25.13:6443: connect: connection refused Dec 13 14:49:04.963494 kubelet[2272]: E1213 14:49:04.963475 2272 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.31.25.13:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.31.25.13:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:49:04.963661 kubelet[2272]: I1213 14:49:04.963647 2272 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:49:04.966330 kubelet[2272]: I1213 14:49:04.966299 2272 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:49:04.975235 kubelet[2272]: W1213 14:49:04.975190 2272 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:49:04.976673 kubelet[2272]: I1213 14:49:04.976648 2272 server.go:1269] "Started kubelet" Dec 13 14:49:04.976000 audit[2272]: AVC avc: denied { mac_admin } for pid=2272 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:04.976000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:49:04.976000 audit[2272]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00065f9b0 a1=c00096c0a8 a2=c00065f980 a3=25 items=0 ppid=1 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:04.976000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:49:04.977000 audit[2272]: AVC avc: denied { mac_admin } for pid=2272 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:04.977000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:49:04.977000 audit[2272]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00042b260 a1=c00096c0c0 a2=c00065fa40 a3=25 items=0 ppid=1 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:04.977000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:49:04.978829 kubelet[2272]: I1213 14:49:04.978338 2272 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:49:04.978829 kubelet[2272]: I1213 14:49:04.978396 2272 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:49:04.978829 kubelet[2272]: I1213 14:49:04.978484 2272 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:49:04.981000 audit[2282]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:04.981000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcd73cf960 a2=0 a3=7ffcd73cf94c items=0 ppid=2272 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:04.981000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:49:04.983937 kubelet[2272]: E1213 14:49:04.983917 2272 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:49:04.982000 audit[2283]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:04.982000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff2897260 a2=0 a3=7ffff289724c items=0 ppid=2272 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:04.982000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:49:04.985867 kubelet[2272]: I1213 14:49:04.985845 2272 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 14:49:04.986105 kubelet[2272]: E1213 14:49:04.986086 2272 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-25-13\" not found" Dec 13 14:49:04.986771 kubelet[2272]: I1213 14:49:04.986741 2272 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:49:04.986000 audit[2285]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:04.986000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd1fee8f00 a2=0 a3=7ffd1fee8eec items=0 ppid=2272 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:04.986000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:49:04.988459 kubelet[2272]: I1213 14:49:04.988442 2272 server.go:460] "Adding debug handlers to kubelet server" Dec 13 14:49:04.989210 kubelet[2272]: I1213 14:49:04.989190 2272 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 14:49:04.989455 kubelet[2272]: I1213 14:49:04.989386 2272 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:49:04.989000 audit[2287]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:04.989000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe37167a30 a2=0 a3=7ffe37167a1c items=0 ppid=2272 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:04.989000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:49:04.991451 kubelet[2272]: I1213 14:49:04.991386 2272 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:49:04.991739 kubelet[2272]: I1213 14:49:04.991723 2272 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:49:04.996814 kubelet[2272]: I1213 14:49:04.996784 2272 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 14:49:04.997356 kubelet[2272]: E1213 14:49:04.997316 2272 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.25.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-13?timeout=10s\": dial tcp 172.31.25.13:6443: connect: connection refused" interval="200ms" Dec 13 14:49:04.999036 kubelet[2272]: E1213 14:49:04.997397 2272 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.25.13:6443/api/v1/namespaces/default/events\": dial tcp 172.31.25.13:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-25-13.1810c3fc4fdbc839 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-25-13,UID:ip-172-31-25-13,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-25-13,},FirstTimestamp:2024-12-13 14:49:04.976619577 +0000 UTC m=+0.686786954,LastTimestamp:2024-12-13 14:49:04.976619577 +0000 UTC m=+0.686786954,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-25-13,}" Dec 13 14:49:04.999382 kubelet[2272]: I1213 14:49:04.999360 2272 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:49:04.999453 kubelet[2272]: I1213 14:49:04.999438 2272 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:49:05.001435 kubelet[2272]: W1213 14:49:05.000220 2272 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.25.13:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.25.13:6443: connect: connection refused Dec 13 14:49:05.001435 kubelet[2272]: E1213 14:49:05.000342 2272 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.31.25.13:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.31.25.13:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:49:05.001763 kubelet[2272]: I1213 14:49:05.001620 2272 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:49:05.019000 audit[2292]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:05.019000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fffa26c1030 a2=0 a3=7fffa26c101c items=0 ppid=2272 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:05.019000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:49:05.022565 kubelet[2272]: I1213 14:49:05.022527 2272 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:49:05.022000 audit[2294]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:05.022000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe0a8b7580 a2=0 a3=7ffe0a8b756c items=0 ppid=2272 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:05.022000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:49:05.024936 kubelet[2272]: I1213 14:49:05.024913 2272 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:49:05.025027 kubelet[2272]: I1213 14:49:05.024942 2272 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:49:05.025027 kubelet[2272]: I1213 14:49:05.024962 2272 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 14:49:05.025027 kubelet[2272]: E1213 14:49:05.025013 2272 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:49:05.026000 audit[2296]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:05.026000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb1ecd8b0 a2=0 a3=7fffb1ecd89c items=0 ppid=2272 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:05.026000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:49:05.028000 audit[2297]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:05.028000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8ce3e320 a2=0 a3=7ffc8ce3e30c items=0 ppid=2272 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:05.028000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:49:05.031345 kubelet[2272]: W1213 14:49:05.031216 2272 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.25.13:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.25.13:6443: connect: connection refused Dec 13 14:49:05.031482 kubelet[2272]: E1213 14:49:05.031366 2272 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.31.25.13:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.31.25.13:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:49:05.031000 audit[2300]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:05.031000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc31f1a1f0 a2=0 a3=7ffc31f1a1dc items=0 ppid=2272 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:05.031000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:49:05.035200 kubelet[2272]: I1213 14:49:05.035181 2272 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:49:05.035200 kubelet[2272]: I1213 14:49:05.035201 2272 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:49:05.035331 kubelet[2272]: I1213 14:49:05.035219 2272 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:49:05.034000 audit[2302]: NETFILTER_CFG table=filter:35 family=10 entries=2 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:05.034000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc6d830670 a2=0 a3=7ffc6d83065c items=0 ppid=2272 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:05.034000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:49:05.035000 audit[2301]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:05.035000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7a190bb0 a2=0 a3=7fff7a190b9c items=0 ppid=2272 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:05.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:49:05.037000 audit[2303]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:05.037000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcad200a10 a2=0 a3=7ffcad2009fc items=0 ppid=2272 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:05.037000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:49:05.038700 kubelet[2272]: I1213 14:49:05.038633 2272 policy_none.go:49] "None policy: Start" Dec 13 14:49:05.039441 kubelet[2272]: I1213 14:49:05.039427 2272 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:49:05.039555 kubelet[2272]: I1213 14:49:05.039536 2272 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:49:05.046512 systemd[1]: Created slice kubepods.slice. Dec 13 14:49:05.057012 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:49:05.060609 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:49:05.064030 kubelet[2272]: I1213 14:49:05.063996 2272 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:49:05.062000 audit[2272]: AVC avc: denied { mac_admin } for pid=2272 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:05.062000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:49:05.062000 audit[2272]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000050450 a1=c000ca8660 a2=c000050420 a3=25 items=0 ppid=1 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:05.062000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:49:05.064624 kubelet[2272]: I1213 14:49:05.064065 2272 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:49:05.064624 kubelet[2272]: I1213 14:49:05.064296 2272 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 14:49:05.064624 kubelet[2272]: I1213 14:49:05.064310 2272 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:49:05.065120 kubelet[2272]: I1213 14:49:05.065107 2272 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:49:05.069110 kubelet[2272]: E1213 14:49:05.069088 2272 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-25-13\" not found" Dec 13 14:49:05.136821 systemd[1]: Created slice kubepods-burstable-pod16db2a976e6648aea59b27dba60b819b.slice. Dec 13 14:49:05.166149 systemd[1]: Created slice kubepods-burstable-pod6bbb3cb5c98840f01b55b37490358faf.slice. Dec 13 14:49:05.168859 kubelet[2272]: I1213 14:49:05.168834 2272 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-25-13" Dec 13 14:49:05.169961 kubelet[2272]: E1213 14:49:05.169935 2272 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.31.25.13:6443/api/v1/nodes\": dial tcp 172.31.25.13:6443: connect: connection refused" node="ip-172-31-25-13" Dec 13 14:49:05.172562 systemd[1]: Created slice kubepods-burstable-pod649c10a6b6cfe8e03f99c4b68b1c2285.slice. Dec 13 14:49:05.198720 kubelet[2272]: E1213 14:49:05.198672 2272 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.25.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-13?timeout=10s\": dial tcp 172.31.25.13:6443: connect: connection refused" interval="400ms" Dec 13 14:49:05.291276 kubelet[2272]: I1213 14:49:05.291167 2272 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6bbb3cb5c98840f01b55b37490358faf-k8s-certs\") pod \"kube-controller-manager-ip-172-31-25-13\" (UID: \"6bbb3cb5c98840f01b55b37490358faf\") " pod="kube-system/kube-controller-manager-ip-172-31-25-13" Dec 13 14:49:05.291427 kubelet[2272]: I1213 14:49:05.291302 2272 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/649c10a6b6cfe8e03f99c4b68b1c2285-kubeconfig\") pod \"kube-scheduler-ip-172-31-25-13\" (UID: \"649c10a6b6cfe8e03f99c4b68b1c2285\") " pod="kube-system/kube-scheduler-ip-172-31-25-13" Dec 13 14:49:05.291427 kubelet[2272]: I1213 14:49:05.291350 2272 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/16db2a976e6648aea59b27dba60b819b-ca-certs\") pod \"kube-apiserver-ip-172-31-25-13\" (UID: \"16db2a976e6648aea59b27dba60b819b\") " pod="kube-system/kube-apiserver-ip-172-31-25-13" Dec 13 14:49:05.291427 kubelet[2272]: I1213 14:49:05.291375 2272 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/16db2a976e6648aea59b27dba60b819b-k8s-certs\") pod \"kube-apiserver-ip-172-31-25-13\" (UID: \"16db2a976e6648aea59b27dba60b819b\") " pod="kube-system/kube-apiserver-ip-172-31-25-13" Dec 13 14:49:05.291427 kubelet[2272]: I1213 14:49:05.291402 2272 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/16db2a976e6648aea59b27dba60b819b-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-25-13\" (UID: \"16db2a976e6648aea59b27dba60b819b\") " pod="kube-system/kube-apiserver-ip-172-31-25-13" Dec 13 14:49:05.291614 kubelet[2272]: I1213 14:49:05.291432 2272 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6bbb3cb5c98840f01b55b37490358faf-ca-certs\") pod \"kube-controller-manager-ip-172-31-25-13\" (UID: \"6bbb3cb5c98840f01b55b37490358faf\") " pod="kube-system/kube-controller-manager-ip-172-31-25-13" Dec 13 14:49:05.291614 kubelet[2272]: I1213 14:49:05.291455 2272 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/6bbb3cb5c98840f01b55b37490358faf-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-25-13\" (UID: \"6bbb3cb5c98840f01b55b37490358faf\") " pod="kube-system/kube-controller-manager-ip-172-31-25-13" Dec 13 14:49:05.291614 kubelet[2272]: I1213 14:49:05.291478 2272 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6bbb3cb5c98840f01b55b37490358faf-kubeconfig\") pod \"kube-controller-manager-ip-172-31-25-13\" (UID: \"6bbb3cb5c98840f01b55b37490358faf\") " pod="kube-system/kube-controller-manager-ip-172-31-25-13" Dec 13 14:49:05.291614 kubelet[2272]: I1213 14:49:05.291500 2272 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6bbb3cb5c98840f01b55b37490358faf-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-25-13\" (UID: \"6bbb3cb5c98840f01b55b37490358faf\") " pod="kube-system/kube-controller-manager-ip-172-31-25-13" Dec 13 14:49:05.373420 kubelet[2272]: I1213 14:49:05.373393 2272 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-25-13" Dec 13 14:49:05.374141 kubelet[2272]: E1213 14:49:05.374111 2272 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.31.25.13:6443/api/v1/nodes\": dial tcp 172.31.25.13:6443: connect: connection refused" node="ip-172-31-25-13" Dec 13 14:49:05.464946 env[1768]: time="2024-12-13T14:49:05.464866480Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-25-13,Uid:16db2a976e6648aea59b27dba60b819b,Namespace:kube-system,Attempt:0,}" Dec 13 14:49:05.472623 env[1768]: time="2024-12-13T14:49:05.472550248Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-25-13,Uid:6bbb3cb5c98840f01b55b37490358faf,Namespace:kube-system,Attempt:0,}" Dec 13 14:49:05.476376 env[1768]: time="2024-12-13T14:49:05.476331286Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-25-13,Uid:649c10a6b6cfe8e03f99c4b68b1c2285,Namespace:kube-system,Attempt:0,}" Dec 13 14:49:05.599724 kubelet[2272]: E1213 14:49:05.599673 2272 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.25.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-13?timeout=10s\": dial tcp 172.31.25.13:6443: connect: connection refused" interval="800ms" Dec 13 14:49:05.775971 kubelet[2272]: I1213 14:49:05.775619 2272 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-25-13" Dec 13 14:49:05.776211 kubelet[2272]: E1213 14:49:05.776183 2272 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.31.25.13:6443/api/v1/nodes\": dial tcp 172.31.25.13:6443: connect: connection refused" node="ip-172-31-25-13" Dec 13 14:49:05.928125 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount492871735.mount: Deactivated successfully. Dec 13 14:49:05.939425 env[1768]: time="2024-12-13T14:49:05.939373847Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:05.944737 env[1768]: time="2024-12-13T14:49:05.944695310Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:05.947123 env[1768]: time="2024-12-13T14:49:05.947028349Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:05.948375 env[1768]: time="2024-12-13T14:49:05.948345089Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:05.952128 env[1768]: time="2024-12-13T14:49:05.952080443Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:05.953517 env[1768]: time="2024-12-13T14:49:05.953476763Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:05.955299 env[1768]: time="2024-12-13T14:49:05.955244976Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:05.957402 env[1768]: time="2024-12-13T14:49:05.957373906Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:05.959296 env[1768]: time="2024-12-13T14:49:05.959253230Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:05.961862 env[1768]: time="2024-12-13T14:49:05.961834334Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:05.962994 env[1768]: time="2024-12-13T14:49:05.962935030Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:05.970100 env[1768]: time="2024-12-13T14:49:05.970052812Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:05.996211 kubelet[2272]: W1213 14:49:05.989622 2272 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.25.13:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.25.13:6443: connect: connection refused Dec 13 14:49:05.996211 kubelet[2272]: E1213 14:49:05.989728 2272 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.31.25.13:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.31.25.13:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:49:06.007006 env[1768]: time="2024-12-13T14:49:06.000978002Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:49:06.007006 env[1768]: time="2024-12-13T14:49:06.001028102Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:49:06.007006 env[1768]: time="2024-12-13T14:49:06.001043678Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:49:06.007006 env[1768]: time="2024-12-13T14:49:06.001197178Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/52ed8a7ddf6362dd6e67845535ff57302178ab442f34eaa40223b966b038f9ac pid=2312 runtime=io.containerd.runc.v2 Dec 13 14:49:06.033363 systemd[1]: Started cri-containerd-52ed8a7ddf6362dd6e67845535ff57302178ab442f34eaa40223b966b038f9ac.scope. Dec 13 14:49:06.073305 kernel: kauditd_printk_skb: 218 callbacks suppressed Dec 13 14:49:06.073451 kernel: audit: type=1400 audit(1734101346.063:447): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.073490 kernel: audit: type=1400 audit(1734101346.063:448): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.085112 kernel: audit: type=1400 audit(1734101346.063:449): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.085247 kernel: audit: type=1400 audit(1734101346.063:450): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.085309 kernel: audit: type=1400 audit(1734101346.063:451): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.089279 kernel: audit: type=1400 audit(1734101346.063:452): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.089341 env[1768]: time="2024-12-13T14:49:06.085450424Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:49:06.089341 env[1768]: time="2024-12-13T14:49:06.085543017Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:49:06.089341 env[1768]: time="2024-12-13T14:49:06.085573207Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:49:06.089341 env[1768]: time="2024-12-13T14:49:06.085858408Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:49:06.089341 env[1768]: time="2024-12-13T14:49:06.085919599Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:49:06.089341 env[1768]: time="2024-12-13T14:49:06.085949635Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:49:06.089341 env[1768]: time="2024-12-13T14:49:06.086086425Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0dc8c117d9d8afbf31cb326df41d99875a947e99d8a969d4be2dfa736303fc76 pid=2350 runtime=io.containerd.runc.v2 Dec 13 14:49:06.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.095318 kernel: audit: type=1400 audit(1734101346.063:453): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.095370 env[1768]: time="2024-12-13T14:49:06.089514114Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cb9e89aceaf4ef4a07a2398679f837bb75984d1d8b906165255ba12b63b4973e pid=2349 runtime=io.containerd.runc.v2 Dec 13 14:49:06.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.103673 kernel: audit: type=1400 audit(1734101346.063:454): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.103768 kernel: audit: type=1400 audit(1734101346.063:455): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.103805 kernel: audit: type=1400 audit(1734101346.063:456): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.063000 audit: BPF prog-id=58 op=LOAD Dec 13 14:49:06.064000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.064000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2312 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532656438613764646636333632646436653637383435353335666635 Dec 13 14:49:06.064000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.064000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2312 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532656438613764646636333632646436653637383435353335666635 Dec 13 14:49:06.064000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.064000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.064000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.064000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.064000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.064000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.064000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.064000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.064000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.064000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.064000 audit: BPF prog-id=59 op=LOAD Dec 13 14:49:06.064000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00030a360 items=0 ppid=2312 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532656438613764646636333632646436653637383435353335666635 Dec 13 14:49:06.068000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.068000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.068000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.068000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.068000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.068000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.068000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.068000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.068000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.068000 audit: BPF prog-id=60 op=LOAD Dec 13 14:49:06.068000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00030a3a8 items=0 ppid=2312 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532656438613764646636333632646436653637383435353335666635 Dec 13 14:49:06.072000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:49:06.072000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:49:06.072000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.072000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.072000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.072000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.072000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.072000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.072000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.072000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.072000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.072000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.072000 audit: BPF prog-id=61 op=LOAD Dec 13 14:49:06.072000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00030a7b8 items=0 ppid=2312 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532656438613764646636333632646436653637383435353335666635 Dec 13 14:49:06.143535 systemd[1]: Started cri-containerd-0dc8c117d9d8afbf31cb326df41d99875a947e99d8a969d4be2dfa736303fc76.scope. Dec 13 14:49:06.156564 systemd[1]: Started cri-containerd-cb9e89aceaf4ef4a07a2398679f837bb75984d1d8b906165255ba12b63b4973e.scope. Dec 13 14:49:06.195232 env[1768]: time="2024-12-13T14:49:06.195197352Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-25-13,Uid:16db2a976e6648aea59b27dba60b819b,Namespace:kube-system,Attempt:0,} returns sandbox id \"52ed8a7ddf6362dd6e67845535ff57302178ab442f34eaa40223b966b038f9ac\"" Dec 13 14:49:06.201544 env[1768]: time="2024-12-13T14:49:06.201505594Z" level=info msg="CreateContainer within sandbox \"52ed8a7ddf6362dd6e67845535ff57302178ab442f34eaa40223b966b038f9ac\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:49:06.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.207000 audit: BPF prog-id=62 op=LOAD Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2350 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064633863313137643964386166626633316362333236646634316439 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2350 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064633863313137643964386166626633316362333236646634316439 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit: BPF prog-id=63 op=LOAD Dec 13 14:49:06.209000 audit[2367]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a9530 items=0 ppid=2350 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064633863313137643964386166626633316362333236646634316439 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit: BPF prog-id=64 op=LOAD Dec 13 14:49:06.209000 audit[2367]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a9578 items=0 ppid=2350 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064633863313137643964386166626633316362333236646634316439 Dec 13 14:49:06.209000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:49:06.209000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.209000 audit: BPF prog-id=65 op=LOAD Dec 13 14:49:06.209000 audit[2367]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a9988 items=0 ppid=2350 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064633863313137643964386166626633316362333236646634316439 Dec 13 14:49:06.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.242000 audit: BPF prog-id=66 op=LOAD Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2349 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362396538396163656166346566346130376132333938363739663833 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2349 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362396538396163656166346566346130376132333938363739663833 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit: BPF prog-id=67 op=LOAD Dec 13 14:49:06.243000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001b2350 items=0 ppid=2349 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362396538396163656166346566346130376132333938363739663833 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit: BPF prog-id=68 op=LOAD Dec 13 14:49:06.243000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001b2398 items=0 ppid=2349 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362396538396163656166346566346130376132333938363739663833 Dec 13 14:49:06.243000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:49:06.243000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.243000 audit: BPF prog-id=69 op=LOAD Dec 13 14:49:06.243000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001b27a8 items=0 ppid=2349 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362396538396163656166346566346130376132333938363739663833 Dec 13 14:49:06.298779 env[1768]: time="2024-12-13T14:49:06.291617510Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-25-13,Uid:6bbb3cb5c98840f01b55b37490358faf,Namespace:kube-system,Attempt:0,} returns sandbox id \"0dc8c117d9d8afbf31cb326df41d99875a947e99d8a969d4be2dfa736303fc76\"" Dec 13 14:49:06.298779 env[1768]: time="2024-12-13T14:49:06.296611298Z" level=info msg="CreateContainer within sandbox \"52ed8a7ddf6362dd6e67845535ff57302178ab442f34eaa40223b966b038f9ac\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"d5af6418004f43bce10f0750deaaca56f07710c22fc41d3c120f3527a86c1563\"" Dec 13 14:49:06.300098 env[1768]: time="2024-12-13T14:49:06.300068149Z" level=info msg="StartContainer for \"d5af6418004f43bce10f0750deaaca56f07710c22fc41d3c120f3527a86c1563\"" Dec 13 14:49:06.304141 env[1768]: time="2024-12-13T14:49:06.304103184Z" level=info msg="CreateContainer within sandbox \"0dc8c117d9d8afbf31cb326df41d99875a947e99d8a969d4be2dfa736303fc76\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:49:06.322930 env[1768]: time="2024-12-13T14:49:06.322873486Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-25-13,Uid:649c10a6b6cfe8e03f99c4b68b1c2285,Namespace:kube-system,Attempt:0,} returns sandbox id \"cb9e89aceaf4ef4a07a2398679f837bb75984d1d8b906165255ba12b63b4973e\"" Dec 13 14:49:06.330997 env[1768]: time="2024-12-13T14:49:06.330943966Z" level=info msg="CreateContainer within sandbox \"cb9e89aceaf4ef4a07a2398679f837bb75984d1d8b906165255ba12b63b4973e\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:49:06.334617 env[1768]: time="2024-12-13T14:49:06.334571473Z" level=info msg="CreateContainer within sandbox \"0dc8c117d9d8afbf31cb326df41d99875a947e99d8a969d4be2dfa736303fc76\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"48b0a03a993b18b2ec2d6080086d696d845ec95059cbbce5ac73949bc2ffceb9\"" Dec 13 14:49:06.335300 env[1768]: time="2024-12-13T14:49:06.335255333Z" level=info msg="StartContainer for \"48b0a03a993b18b2ec2d6080086d696d845ec95059cbbce5ac73949bc2ffceb9\"" Dec 13 14:49:06.347012 systemd[1]: Started cri-containerd-d5af6418004f43bce10f0750deaaca56f07710c22fc41d3c120f3527a86c1563.scope. Dec 13 14:49:06.366544 env[1768]: time="2024-12-13T14:49:06.366495745Z" level=info msg="CreateContainer within sandbox \"cb9e89aceaf4ef4a07a2398679f837bb75984d1d8b906165255ba12b63b4973e\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"110fb40e72c490616278f1a1ab17ea09c4d7bb284cf219ffb81de5c30a880326\"" Dec 13 14:49:06.367968 env[1768]: time="2024-12-13T14:49:06.367936299Z" level=info msg="StartContainer for \"110fb40e72c490616278f1a1ab17ea09c4d7bb284cf219ffb81de5c30a880326\"" Dec 13 14:49:06.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.374000 audit: BPF prog-id=70 op=LOAD Dec 13 14:49:06.375000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.375000 audit[2439]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2312 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435616636343138303034663433626365313066303735306465616163 Dec 13 14:49:06.376000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.376000 audit[2439]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2312 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435616636343138303034663433626365313066303735306465616163 Dec 13 14:49:06.376000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.376000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.376000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.376000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.376000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.376000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.376000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.376000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.376000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.376000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.376000 audit: BPF prog-id=71 op=LOAD Dec 13 14:49:06.376000 audit[2439]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002111e0 items=0 ppid=2312 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435616636343138303034663433626365313066303735306465616163 Dec 13 14:49:06.378000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.378000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.378000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.378000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.378000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.378000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.378000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.378000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.378000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.378000 audit: BPF prog-id=72 op=LOAD Dec 13 14:49:06.378000 audit[2439]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000211228 items=0 ppid=2312 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435616636343138303034663433626365313066303735306465616163 Dec 13 14:49:06.378000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:49:06.378000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:49:06.378000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.378000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.378000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.378000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.378000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.378000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.378000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.378000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.378000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.378000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.378000 audit: BPF prog-id=73 op=LOAD Dec 13 14:49:06.378000 audit[2439]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000211638 items=0 ppid=2312 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435616636343138303034663433626365313066303735306465616163 Dec 13 14:49:06.385709 kubelet[2272]: W1213 14:49:06.385594 2272 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.25.13:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.25.13:6443: connect: connection refused Dec 13 14:49:06.385709 kubelet[2272]: E1213 14:49:06.385662 2272 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.31.25.13:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.31.25.13:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:49:06.394786 systemd[1]: Started cri-containerd-48b0a03a993b18b2ec2d6080086d696d845ec95059cbbce5ac73949bc2ffceb9.scope. Dec 13 14:49:06.400201 kubelet[2272]: E1213 14:49:06.400144 2272 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.25.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-13?timeout=10s\": dial tcp 172.31.25.13:6443: connect: connection refused" interval="1.6s" Dec 13 14:49:06.439573 systemd[1]: Started cri-containerd-110fb40e72c490616278f1a1ab17ea09c4d7bb284cf219ffb81de5c30a880326.scope. Dec 13 14:49:06.453735 env[1768]: time="2024-12-13T14:49:06.453675147Z" level=info msg="StartContainer for \"d5af6418004f43bce10f0750deaaca56f07710c22fc41d3c120f3527a86c1563\" returns successfully" Dec 13 14:49:06.455647 kubelet[2272]: W1213 14:49:06.455430 2272 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.25.13:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.31.25.13:6443: connect: connection refused Dec 13 14:49:06.455647 kubelet[2272]: E1213 14:49:06.455603 2272 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.31.25.13:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.31.25.13:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:49:06.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.461000 audit: BPF prog-id=74 op=LOAD Dec 13 14:49:06.462000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.462000 audit[2463]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2350 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.464000 audit: BPF prog-id=75 op=LOAD Dec 13 14:49:06.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438623061303361393933623138623265633264363038303038366436 Dec 13 14:49:06.465000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.465000 audit[2463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2350 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438623061303361393933623138623265633264363038303038366436 Dec 13 14:49:06.465000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.465000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.465000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.465000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.465000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.465000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.465000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.465000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.465000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.465000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.465000 audit: BPF prog-id=76 op=LOAD Dec 13 14:49:06.465000 audit[2463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00023dda0 items=0 ppid=2350 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438623061303361393933623138623265633264363038303038366436 Dec 13 14:49:06.466000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.466000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.466000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.466000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.466000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.466000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.466000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.466000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.466000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.466000 audit: BPF prog-id=77 op=LOAD Dec 13 14:49:06.466000 audit[2463]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00023dde8 items=0 ppid=2350 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438623061303361393933623138623265633264363038303038366436 Dec 13 14:49:06.467000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:49:06.467000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:49:06.467000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.467000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.468000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.468000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2349 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.467000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.467000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.467000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.467000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.467000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.467000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.467000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.467000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.467000 audit: BPF prog-id=78 op=LOAD Dec 13 14:49:06.467000 audit[2463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003341f8 items=0 ppid=2350 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438623061303361393933623138623265633264363038303038366436 Dec 13 14:49:06.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131306662343065373263343930363136323738663161316162313765 Dec 13 14:49:06.469000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.469000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2349 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131306662343065373263343930363136323738663161316162313765 Dec 13 14:49:06.469000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.469000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.469000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.469000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.469000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.469000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.469000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.469000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.469000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.469000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.469000 audit: BPF prog-id=79 op=LOAD Dec 13 14:49:06.469000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000295150 items=0 ppid=2349 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131306662343065373263343930363136323738663161316162313765 Dec 13 14:49:06.470000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.470000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.470000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.470000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.470000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.470000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.470000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.470000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.470000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.470000 audit: BPF prog-id=80 op=LOAD Dec 13 14:49:06.470000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000295198 items=0 ppid=2349 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131306662343065373263343930363136323738663161316162313765 Dec 13 14:49:06.472000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:49:06.472000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:49:06.472000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.472000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.472000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.472000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.472000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.472000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.472000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.472000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.472000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.472000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:06.472000 audit: BPF prog-id=81 op=LOAD Dec 13 14:49:06.472000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002955a8 items=0 ppid=2349 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:06.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131306662343065373263343930363136323738663161316162313765 Dec 13 14:49:06.533501 env[1768]: time="2024-12-13T14:49:06.533449228Z" level=info msg="StartContainer for \"110fb40e72c490616278f1a1ab17ea09c4d7bb284cf219ffb81de5c30a880326\" returns successfully" Dec 13 14:49:06.535472 env[1768]: time="2024-12-13T14:49:06.535426967Z" level=info msg="StartContainer for \"48b0a03a993b18b2ec2d6080086d696d845ec95059cbbce5ac73949bc2ffceb9\" returns successfully" Dec 13 14:49:06.552962 kubelet[2272]: W1213 14:49:06.552747 2272 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.25.13:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-13&limit=500&resourceVersion=0": dial tcp 172.31.25.13:6443: connect: connection refused Dec 13 14:49:06.552962 kubelet[2272]: E1213 14:49:06.552835 2272 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.31.25.13:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-13&limit=500&resourceVersion=0\": dial tcp 172.31.25.13:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:49:06.578883 kubelet[2272]: I1213 14:49:06.578672 2272 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-25-13" Dec 13 14:49:06.579419 kubelet[2272]: E1213 14:49:06.579370 2272 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.31.25.13:6443/api/v1/nodes\": dial tcp 172.31.25.13:6443: connect: connection refused" node="ip-172-31-25-13" Dec 13 14:49:06.921431 kubelet[2272]: E1213 14:49:06.921392 2272 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://172.31.25.13:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 172.31.25.13:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:49:07.477000 audit[2499]: AVC avc: denied { watch } for pid=2499 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:49:07.477000 audit[2499]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000aee0f0 a2=fc6 a3=0 items=0 ppid=2350 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:49:07.477000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:49:07.477000 audit[2499]: AVC avc: denied { watch } for pid=2499 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:49:07.477000 audit[2499]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000796040 a2=fc6 a3=0 items=0 ppid=2350 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:49:07.477000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:49:08.182112 kubelet[2272]: I1213 14:49:08.182076 2272 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-25-13" Dec 13 14:49:08.849000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:49:08.849000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0052dbcb0 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:49:08.849000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:49:08.849000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c00471e2d0 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:49:08.849000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:49:08.849000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:49:08.852000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:49:08.852000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c00453c000 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:49:08.852000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:49:08.858000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:49:08.858000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c00471e450 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:49:08.858000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:49:08.886000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:49:08.886000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c004864fa0 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:49:08.886000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:49:08.886000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:49:08.886000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c00471f5f0 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:49:08.886000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:49:08.966150 kubelet[2272]: I1213 14:49:08.966106 2272 apiserver.go:52] "Watching apiserver" Dec 13 14:49:09.087191 kubelet[2272]: E1213 14:49:09.087159 2272 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-25-13\" not found" node="ip-172-31-25-13" Dec 13 14:49:09.091092 kubelet[2272]: I1213 14:49:09.091062 2272 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 14:49:09.128374 kubelet[2272]: I1213 14:49:09.128052 2272 kubelet_node_status.go:75] "Successfully registered node" node="ip-172-31-25-13" Dec 13 14:49:09.128374 kubelet[2272]: E1213 14:49:09.128320 2272 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"ip-172-31-25-13\": node \"ip-172-31-25-13\" not found" Dec 13 14:49:11.279745 systemd[1]: Reloading. Dec 13 14:49:11.421164 /usr/lib/systemd/system-generators/torcx-generator[2571]: time="2024-12-13T14:49:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:49:11.421203 /usr/lib/systemd/system-generators/torcx-generator[2571]: time="2024-12-13T14:49:11Z" level=info msg="torcx already run" Dec 13 14:49:11.570703 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:49:11.570723 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:49:11.591095 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:49:11.693337 kernel: kauditd_printk_skb: 356 callbacks suppressed Dec 13 14:49:11.693483 kernel: audit: type=1400 audit(1734101351.684:563): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.693538 kernel: audit: type=1400 audit(1734101351.684:564): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.696629 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:49:11.701957 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:49:11.702088 kernel: audit: type=1400 audit(1734101351.684:565): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.702285 kernel: audit: backlog limit exceeded Dec 13 14:49:11.702323 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:49:11.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.708382 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:49:11.708470 kernel: audit: type=1400 audit(1734101351.684:566): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.708514 kernel: audit: backlog limit exceeded Dec 13 14:49:11.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.688000 audit: BPF prog-id=82 op=LOAD Dec 13 14:49:11.688000 audit: BPF prog-id=62 op=UNLOAD Dec 13 14:49:11.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.692000 audit: BPF prog-id=83 op=LOAD Dec 13 14:49:11.692000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:49:11.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.692000 audit: BPF prog-id=84 op=LOAD Dec 13 14:49:11.693000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:49:11.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.693000 audit: BPF prog-id=85 op=LOAD Dec 13 14:49:11.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.693000 audit: BPF prog-id=86 op=LOAD Dec 13 14:49:11.693000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:49:11.693000 audit: BPF prog-id=45 op=UNLOAD Dec 13 14:49:11.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.709000 audit: BPF prog-id=88 op=LOAD Dec 13 14:49:11.709000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:49:11.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.712000 audit: BPF prog-id=89 op=LOAD Dec 13 14:49:11.712000 audit: BPF prog-id=48 op=UNLOAD Dec 13 14:49:11.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.712000 audit: BPF prog-id=90 op=LOAD Dec 13 14:49:11.712000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:49:11.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.714000 audit: BPF prog-id=91 op=LOAD Dec 13 14:49:11.715000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit: BPF prog-id=92 op=LOAD Dec 13 14:49:11.717000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit: BPF prog-id=93 op=LOAD Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.717000 audit: BPF prog-id=94 op=LOAD Dec 13 14:49:11.717000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:49:11.717000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:49:11.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.718000 audit: BPF prog-id=95 op=LOAD Dec 13 14:49:11.718000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:49:11.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.721000 audit: BPF prog-id=96 op=LOAD Dec 13 14:49:11.721000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:49:11.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.721000 audit: BPF prog-id=97 op=LOAD Dec 13 14:49:11.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.722000 audit: BPF prog-id=98 op=LOAD Dec 13 14:49:11.722000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:49:11.722000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:49:11.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.723000 audit: BPF prog-id=99 op=LOAD Dec 13 14:49:11.723000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit: BPF prog-id=100 op=LOAD Dec 13 14:49:11.724000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit: BPF prog-id=101 op=LOAD Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:11.724000 audit: BPF prog-id=102 op=LOAD Dec 13 14:49:11.724000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:49:11.724000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:49:11.746562 systemd[1]: Stopping kubelet.service... Dec 13 14:49:11.772662 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:49:11.773002 systemd[1]: Stopped kubelet.service. Dec 13 14:49:11.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:11.775398 systemd[1]: Starting kubelet.service... Dec 13 14:49:13.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:13.190796 systemd[1]: Started kubelet.service. Dec 13 14:49:13.313989 kubelet[2628]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:49:13.314465 kubelet[2628]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:49:13.314615 kubelet[2628]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:49:13.316143 kubelet[2628]: I1213 14:49:13.316095 2628 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:49:13.336530 kubelet[2628]: I1213 14:49:13.336486 2628 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 14:49:13.336530 kubelet[2628]: I1213 14:49:13.336519 2628 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:49:13.338928 kubelet[2628]: I1213 14:49:13.338815 2628 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 14:49:13.342791 kubelet[2628]: I1213 14:49:13.342700 2628 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:49:13.349002 kubelet[2628]: I1213 14:49:13.348973 2628 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:49:13.366977 kubelet[2628]: E1213 14:49:13.366927 2628 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 14:49:13.367136 kubelet[2628]: I1213 14:49:13.366973 2628 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 14:49:13.371560 kubelet[2628]: I1213 14:49:13.371494 2628 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:49:13.372403 kubelet[2628]: I1213 14:49:13.372386 2628 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 14:49:13.372690 kubelet[2628]: I1213 14:49:13.372658 2628 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:49:13.372939 kubelet[2628]: I1213 14:49:13.372768 2628 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-25-13","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 14:49:13.373057 kubelet[2628]: I1213 14:49:13.373045 2628 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:49:13.373105 kubelet[2628]: I1213 14:49:13.373100 2628 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 14:49:13.373172 kubelet[2628]: I1213 14:49:13.373166 2628 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:49:13.373420 kubelet[2628]: I1213 14:49:13.373350 2628 kubelet.go:408] "Attempting to sync node with API server" Dec 13 14:49:13.373528 kubelet[2628]: I1213 14:49:13.373518 2628 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:49:13.373627 kubelet[2628]: I1213 14:49:13.373620 2628 kubelet.go:314] "Adding apiserver pod source" Dec 13 14:49:13.373701 kubelet[2628]: I1213 14:49:13.373693 2628 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:49:13.374892 kubelet[2628]: I1213 14:49:13.374876 2628 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:49:13.375523 kubelet[2628]: I1213 14:49:13.375507 2628 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:49:13.382660 kubelet[2628]: I1213 14:49:13.382633 2628 server.go:1269] "Started kubelet" Dec 13 14:49:13.390000 audit[2628]: AVC avc: denied { mac_admin } for pid=2628 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:13.390000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:49:13.390000 audit[2628]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008419e0 a1=c00089aea0 a2=c0008419b0 a3=25 items=0 ppid=1 pid=2628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:13.390000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:49:13.392317 kubelet[2628]: I1213 14:49:13.391818 2628 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:49:13.392576 kubelet[2628]: I1213 14:49:13.392555 2628 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:49:13.392689 kubelet[2628]: I1213 14:49:13.392680 2628 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:49:13.391000 audit[2628]: AVC avc: denied { mac_admin } for pid=2628 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:13.391000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:49:13.391000 audit[2628]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008bb4c0 a1=c00089aeb8 a2=c000841a70 a3=25 items=0 ppid=1 pid=2628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:13.391000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:49:13.406203 kubelet[2628]: I1213 14:49:13.406171 2628 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:49:13.407745 kubelet[2628]: I1213 14:49:13.407723 2628 server.go:460] "Adding debug handlers to kubelet server" Dec 13 14:49:13.439218 kubelet[2628]: I1213 14:49:13.439079 2628 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:49:13.440145 kubelet[2628]: I1213 14:49:13.440123 2628 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:49:13.441022 kubelet[2628]: I1213 14:49:13.441002 2628 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 14:49:13.451367 kubelet[2628]: I1213 14:49:13.451277 2628 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 14:49:13.452072 kubelet[2628]: E1213 14:49:13.452048 2628 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-25-13\" not found" Dec 13 14:49:13.457369 kubelet[2628]: I1213 14:49:13.457347 2628 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:49:13.457681 kubelet[2628]: I1213 14:49:13.457659 2628 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:49:13.467019 kubelet[2628]: I1213 14:49:13.466995 2628 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:49:13.470583 kubelet[2628]: I1213 14:49:13.470555 2628 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 14:49:13.471607 kubelet[2628]: I1213 14:49:13.471589 2628 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:49:13.490445 kubelet[2628]: E1213 14:49:13.490412 2628 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:49:13.492691 kubelet[2628]: I1213 14:49:13.492595 2628 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:49:13.494992 kubelet[2628]: I1213 14:49:13.494969 2628 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:49:13.495961 kubelet[2628]: I1213 14:49:13.495947 2628 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:49:13.496133 kubelet[2628]: I1213 14:49:13.496122 2628 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 14:49:13.496342 kubelet[2628]: E1213 14:49:13.496321 2628 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:49:13.568800 kubelet[2628]: I1213 14:49:13.568781 2628 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:49:13.568951 kubelet[2628]: I1213 14:49:13.568941 2628 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:49:13.569004 kubelet[2628]: I1213 14:49:13.568999 2628 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:49:13.569225 kubelet[2628]: I1213 14:49:13.569208 2628 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:49:13.569368 kubelet[2628]: I1213 14:49:13.569342 2628 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:49:13.569445 kubelet[2628]: I1213 14:49:13.569438 2628 policy_none.go:49] "None policy: Start" Dec 13 14:49:13.570171 kubelet[2628]: I1213 14:49:13.570157 2628 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:49:13.570302 kubelet[2628]: I1213 14:49:13.570291 2628 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:49:13.570707 kubelet[2628]: I1213 14:49:13.570694 2628 state_mem.go:75] "Updated machine memory state" Dec 13 14:49:13.578488 kubelet[2628]: I1213 14:49:13.578464 2628 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:49:13.578758 kubelet[2628]: I1213 14:49:13.578741 2628 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:49:13.577000 audit[2628]: AVC avc: denied { mac_admin } for pid=2628 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:13.577000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:49:13.577000 audit[2628]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f05530 a1=c000f9aa08 a2=c000f05500 a3=25 items=0 ppid=1 pid=2628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:13.577000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:49:13.579323 kubelet[2628]: I1213 14:49:13.579310 2628 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 14:49:13.579440 kubelet[2628]: I1213 14:49:13.579399 2628 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:49:13.581549 kubelet[2628]: I1213 14:49:13.581534 2628 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:49:13.673170 kubelet[2628]: I1213 14:49:13.673122 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6bbb3cb5c98840f01b55b37490358faf-ca-certs\") pod \"kube-controller-manager-ip-172-31-25-13\" (UID: \"6bbb3cb5c98840f01b55b37490358faf\") " pod="kube-system/kube-controller-manager-ip-172-31-25-13" Dec 13 14:49:13.673515 kubelet[2628]: I1213 14:49:13.673493 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6bbb3cb5c98840f01b55b37490358faf-kubeconfig\") pod \"kube-controller-manager-ip-172-31-25-13\" (UID: \"6bbb3cb5c98840f01b55b37490358faf\") " pod="kube-system/kube-controller-manager-ip-172-31-25-13" Dec 13 14:49:13.673667 kubelet[2628]: I1213 14:49:13.673646 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6bbb3cb5c98840f01b55b37490358faf-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-25-13\" (UID: \"6bbb3cb5c98840f01b55b37490358faf\") " pod="kube-system/kube-controller-manager-ip-172-31-25-13" Dec 13 14:49:13.673872 kubelet[2628]: I1213 14:49:13.673856 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/649c10a6b6cfe8e03f99c4b68b1c2285-kubeconfig\") pod \"kube-scheduler-ip-172-31-25-13\" (UID: \"649c10a6b6cfe8e03f99c4b68b1c2285\") " pod="kube-system/kube-scheduler-ip-172-31-25-13" Dec 13 14:49:13.674009 kubelet[2628]: I1213 14:49:13.673995 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6bbb3cb5c98840f01b55b37490358faf-k8s-certs\") pod \"kube-controller-manager-ip-172-31-25-13\" (UID: \"6bbb3cb5c98840f01b55b37490358faf\") " pod="kube-system/kube-controller-manager-ip-172-31-25-13" Dec 13 14:49:13.674189 kubelet[2628]: I1213 14:49:13.674171 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/16db2a976e6648aea59b27dba60b819b-ca-certs\") pod \"kube-apiserver-ip-172-31-25-13\" (UID: \"16db2a976e6648aea59b27dba60b819b\") " pod="kube-system/kube-apiserver-ip-172-31-25-13" Dec 13 14:49:13.674328 kubelet[2628]: I1213 14:49:13.674316 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/16db2a976e6648aea59b27dba60b819b-k8s-certs\") pod \"kube-apiserver-ip-172-31-25-13\" (UID: \"16db2a976e6648aea59b27dba60b819b\") " pod="kube-system/kube-apiserver-ip-172-31-25-13" Dec 13 14:49:13.674420 kubelet[2628]: I1213 14:49:13.674410 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/16db2a976e6648aea59b27dba60b819b-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-25-13\" (UID: \"16db2a976e6648aea59b27dba60b819b\") " pod="kube-system/kube-apiserver-ip-172-31-25-13" Dec 13 14:49:13.674589 kubelet[2628]: I1213 14:49:13.674576 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/6bbb3cb5c98840f01b55b37490358faf-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-25-13\" (UID: \"6bbb3cb5c98840f01b55b37490358faf\") " pod="kube-system/kube-controller-manager-ip-172-31-25-13" Dec 13 14:49:13.704809 kubelet[2628]: I1213 14:49:13.704714 2628 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-25-13" Dec 13 14:49:13.724440 kubelet[2628]: I1213 14:49:13.723323 2628 kubelet_node_status.go:111] "Node was previously registered" node="ip-172-31-25-13" Dec 13 14:49:13.724440 kubelet[2628]: I1213 14:49:13.723460 2628 kubelet_node_status.go:75] "Successfully registered node" node="ip-172-31-25-13" Dec 13 14:49:13.815000 audit[2499]: AVC avc: denied { watch } for pid=2499 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:49:13.815000 audit[2499]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c3ce20 a2=fc6 a3=0 items=0 ppid=2350 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:49:13.815000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:49:13.816000 audit[2499]: AVC avc: denied { watch } for pid=2499 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:49:13.816000 audit[2499]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c3cfe0 a2=fc6 a3=0 items=0 ppid=2350 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:49:13.816000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:49:13.818000 audit[2499]: AVC avc: denied { watch } for pid=2499 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:49:13.818000 audit[2499]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c3d1a0 a2=fc6 a3=0 items=0 ppid=2350 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:49:13.818000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:49:13.818000 audit[2499]: AVC avc: denied { watch } for pid=2499 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:49:13.818000 audit[2499]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000daf200 a2=fc6 a3=0 items=0 ppid=2350 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:49:13.818000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:49:14.066000 audit[2499]: AVC avc: denied { watch } for pid=2499 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:49:14.066000 audit[2499]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000934f40 a2=fc6 a3=0 items=0 ppid=2350 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:49:14.066000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:49:14.404957 kubelet[2628]: I1213 14:49:14.404834 2628 apiserver.go:52] "Watching apiserver" Dec 13 14:49:14.472158 kubelet[2628]: I1213 14:49:14.472132 2628 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 14:49:14.705922 kubelet[2628]: I1213 14:49:14.705842 2628 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-25-13" podStartSLOduration=1.705821147 podStartE2EDuration="1.705821147s" podCreationTimestamp="2024-12-13 14:49:13 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:49:14.664249001 +0000 UTC m=+1.450706927" watchObservedRunningTime="2024-12-13 14:49:14.705821147 +0000 UTC m=+1.492279070" Dec 13 14:49:14.728614 kubelet[2628]: I1213 14:49:14.728544 2628 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-25-13" podStartSLOduration=1.7284656250000001 podStartE2EDuration="1.728465625s" podCreationTimestamp="2024-12-13 14:49:13 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:49:14.707447937 +0000 UTC m=+1.493905862" watchObservedRunningTime="2024-12-13 14:49:14.728465625 +0000 UTC m=+1.514923548" Dec 13 14:49:14.748206 kubelet[2628]: I1213 14:49:14.748127 2628 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-25-13" podStartSLOduration=1.748105937 podStartE2EDuration="1.748105937s" podCreationTimestamp="2024-12-13 14:49:13 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:49:14.72864236 +0000 UTC m=+1.515100262" watchObservedRunningTime="2024-12-13 14:49:14.748105937 +0000 UTC m=+1.534563858" Dec 13 14:49:15.178650 amazon-ssm-agent[1717]: 2024-12-13 14:49:15 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Dec 13 14:49:15.911270 update_engine[1733]: I1213 14:49:15.910320 1733 update_attempter.cc:509] Updating boot flags... Dec 13 14:49:17.498667 kubelet[2628]: I1213 14:49:17.498632 2628 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:49:17.499209 env[1768]: time="2024-12-13T14:49:17.499017600Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:49:17.499633 kubelet[2628]: I1213 14:49:17.499611 2628 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:49:17.822881 systemd[1]: Created slice kubepods-besteffort-podaaf95b9d_08dd_4d9c_9d93_c265791f8079.slice. Dec 13 14:49:17.912230 kubelet[2628]: I1213 14:49:17.912192 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/aaf95b9d-08dd-4d9c-9d93-c265791f8079-xtables-lock\") pod \"kube-proxy-xc79b\" (UID: \"aaf95b9d-08dd-4d9c-9d93-c265791f8079\") " pod="kube-system/kube-proxy-xc79b" Dec 13 14:49:17.912596 kubelet[2628]: I1213 14:49:17.912576 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/aaf95b9d-08dd-4d9c-9d93-c265791f8079-kube-proxy\") pod \"kube-proxy-xc79b\" (UID: \"aaf95b9d-08dd-4d9c-9d93-c265791f8079\") " pod="kube-system/kube-proxy-xc79b" Dec 13 14:49:17.912759 kubelet[2628]: I1213 14:49:17.912744 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/aaf95b9d-08dd-4d9c-9d93-c265791f8079-lib-modules\") pod \"kube-proxy-xc79b\" (UID: \"aaf95b9d-08dd-4d9c-9d93-c265791f8079\") " pod="kube-system/kube-proxy-xc79b" Dec 13 14:49:17.912909 kubelet[2628]: I1213 14:49:17.912895 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2qwmh\" (UniqueName: \"kubernetes.io/projected/aaf95b9d-08dd-4d9c-9d93-c265791f8079-kube-api-access-2qwmh\") pod \"kube-proxy-xc79b\" (UID: \"aaf95b9d-08dd-4d9c-9d93-c265791f8079\") " pod="kube-system/kube-proxy-xc79b" Dec 13 14:49:18.049805 kubelet[2628]: E1213 14:49:18.049766 2628 projected.go:288] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Dec 13 14:49:18.049805 kubelet[2628]: E1213 14:49:18.049806 2628 projected.go:194] Error preparing data for projected volume kube-api-access-2qwmh for pod kube-system/kube-proxy-xc79b: configmap "kube-root-ca.crt" not found Dec 13 14:49:18.051630 kubelet[2628]: E1213 14:49:18.051605 2628 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/aaf95b9d-08dd-4d9c-9d93-c265791f8079-kube-api-access-2qwmh podName:aaf95b9d-08dd-4d9c-9d93-c265791f8079 nodeName:}" failed. No retries permitted until 2024-12-13 14:49:18.549869071 +0000 UTC m=+5.336326992 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-2qwmh" (UniqueName: "kubernetes.io/projected/aaf95b9d-08dd-4d9c-9d93-c265791f8079-kube-api-access-2qwmh") pod "kube-proxy-xc79b" (UID: "aaf95b9d-08dd-4d9c-9d93-c265791f8079") : configmap "kube-root-ca.crt" not found Dec 13 14:49:18.372277 sudo[2018]: pam_unix(sudo:session): session closed for user root Dec 13 14:49:18.371000 audit[2018]: USER_END pid=2018 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:49:18.377121 kernel: kauditd_printk_skb: 267 callbacks suppressed Dec 13 14:49:18.377216 kernel: audit: type=1106 audit(1734101358.371:815): pid=2018 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:49:18.376000 audit[2018]: CRED_DISP pid=2018 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:49:18.381338 kernel: audit: type=1104 audit(1734101358.376:816): pid=2018 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:49:18.404242 sshd[2015]: pam_unix(sshd:session): session closed for user core Dec 13 14:49:18.404000 audit[2015]: USER_END pid=2015 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:49:18.407598 systemd[1]: sshd@6-172.31.25.13:22-139.178.89.65:48674.service: Deactivated successfully. Dec 13 14:49:18.408461 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:49:18.408615 systemd[1]: session-7.scope: Consumed 4.553s CPU time. Dec 13 14:49:18.410406 systemd-logind[1732]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:49:18.411618 kernel: audit: type=1106 audit(1734101358.404:817): pid=2015 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:49:18.411994 systemd-logind[1732]: Removed session 7. Dec 13 14:49:18.404000 audit[2015]: CRED_DISP pid=2015 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:49:18.417287 kernel: audit: type=1104 audit(1734101358.404:818): pid=2015 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:49:18.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.25.13:22-139.178.89.65:48674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:18.423292 kernel: audit: type=1131 audit(1734101358.404:819): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.25.13:22-139.178.89.65:48674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:49:18.475802 systemd[1]: Created slice kubepods-besteffort-podaa99f81a_e7e0_4707_8527_bfb039a24daa.slice. Dec 13 14:49:18.618883 kubelet[2628]: I1213 14:49:18.618748 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/aa99f81a-e7e0-4707-8527-bfb039a24daa-var-lib-calico\") pod \"tigera-operator-76c4976dd7-vph2k\" (UID: \"aa99f81a-e7e0-4707-8527-bfb039a24daa\") " pod="tigera-operator/tigera-operator-76c4976dd7-vph2k" Dec 13 14:49:18.619560 kubelet[2628]: I1213 14:49:18.618896 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pqrvn\" (UniqueName: \"kubernetes.io/projected/aa99f81a-e7e0-4707-8527-bfb039a24daa-kube-api-access-pqrvn\") pod \"tigera-operator-76c4976dd7-vph2k\" (UID: \"aa99f81a-e7e0-4707-8527-bfb039a24daa\") " pod="tigera-operator/tigera-operator-76c4976dd7-vph2k" Dec 13 14:49:18.619894 kubelet[2628]: I1213 14:49:18.619869 2628 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 13 14:49:18.734891 env[1768]: time="2024-12-13T14:49:18.734846859Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-xc79b,Uid:aaf95b9d-08dd-4d9c-9d93-c265791f8079,Namespace:kube-system,Attempt:0,}" Dec 13 14:49:18.757666 env[1768]: time="2024-12-13T14:49:18.757598640Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:49:18.757850 env[1768]: time="2024-12-13T14:49:18.757652619Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:49:18.757944 env[1768]: time="2024-12-13T14:49:18.757844596Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:49:18.758315 env[1768]: time="2024-12-13T14:49:18.758128076Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f16545432ec55de794fe373b774e48a726e14b6d0d08b08bb62a8a37fbd39246 pid=2977 runtime=io.containerd.runc.v2 Dec 13 14:49:18.779517 env[1768]: time="2024-12-13T14:49:18.779467376Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-vph2k,Uid:aa99f81a-e7e0-4707-8527-bfb039a24daa,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:49:18.783154 systemd[1]: Started cri-containerd-f16545432ec55de794fe373b774e48a726e14b6d0d08b08bb62a8a37fbd39246.scope. Dec 13 14:49:18.817991 kernel: audit: type=1400 audit(1734101358.810:820): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.818123 kernel: audit: type=1400 audit(1734101358.810:821): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.818165 kernel: audit: type=1400 audit(1734101358.810:822): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.821627 kernel: audit: type=1400 audit(1734101358.810:823): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.828569 kernel: audit: type=1400 audit(1734101358.810:824): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.821000 audit: BPF prog-id=103 op=LOAD Dec 13 14:49:18.821000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.821000 audit[2986]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2977 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:18.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631363534353433326563353564653739346665333733623737346534 Dec 13 14:49:18.821000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.821000 audit[2986]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2977 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:18.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631363534353433326563353564653739346665333733623737346534 Dec 13 14:49:18.821000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.821000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.821000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.821000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.821000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.821000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.821000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.821000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.821000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.821000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.821000 audit: BPF prog-id=104 op=LOAD Dec 13 14:49:18.821000 audit[2986]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025230 items=0 ppid=2977 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:18.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631363534353433326563353564653739346665333733623737346534 Dec 13 14:49:18.828000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.828000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.828000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.828000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.828000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.828000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.828000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.828000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.828000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.828000 audit: BPF prog-id=105 op=LOAD Dec 13 14:49:18.828000 audit[2986]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025278 items=0 ppid=2977 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:18.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631363534353433326563353564653739346665333733623737346534 Dec 13 14:49:18.828000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:49:18.828000 audit: BPF prog-id=104 op=UNLOAD Dec 13 14:49:18.828000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.828000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.828000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.828000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.828000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.828000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.828000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.828000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.828000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.828000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.828000 audit: BPF prog-id=106 op=LOAD Dec 13 14:49:18.828000 audit[2986]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025688 items=0 ppid=2977 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:18.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631363534353433326563353564653739346665333733623737346534 Dec 13 14:49:18.840826 env[1768]: time="2024-12-13T14:49:18.839916954Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:49:18.840826 env[1768]: time="2024-12-13T14:49:18.839962414Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:49:18.840826 env[1768]: time="2024-12-13T14:49:18.839978347Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:49:18.840826 env[1768]: time="2024-12-13T14:49:18.840120187Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0e4e2e00a068cd3e92327212acd87bcc3875ada9f10b69264ed2f4d10c79dd50 pid=3009 runtime=io.containerd.runc.v2 Dec 13 14:49:18.854081 env[1768]: time="2024-12-13T14:49:18.853987256Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-xc79b,Uid:aaf95b9d-08dd-4d9c-9d93-c265791f8079,Namespace:kube-system,Attempt:0,} returns sandbox id \"f16545432ec55de794fe373b774e48a726e14b6d0d08b08bb62a8a37fbd39246\"" Dec 13 14:49:18.860511 env[1768]: time="2024-12-13T14:49:18.860465413Z" level=info msg="CreateContainer within sandbox \"f16545432ec55de794fe373b774e48a726e14b6d0d08b08bb62a8a37fbd39246\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:49:18.871189 systemd[1]: Started cri-containerd-0e4e2e00a068cd3e92327212acd87bcc3875ada9f10b69264ed2f4d10c79dd50.scope. Dec 13 14:49:18.893096 env[1768]: time="2024-12-13T14:49:18.893047252Z" level=info msg="CreateContainer within sandbox \"f16545432ec55de794fe373b774e48a726e14b6d0d08b08bb62a8a37fbd39246\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"9321dfa6a4cc79a651cebde3846c559887e6246de7cb7b4e75683726eb67d0c6\"" Dec 13 14:49:18.895556 env[1768]: time="2024-12-13T14:49:18.893842923Z" level=info msg="StartContainer for \"9321dfa6a4cc79a651cebde3846c559887e6246de7cb7b4e75683726eb67d0c6\"" Dec 13 14:49:18.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.900000 audit: BPF prog-id=107 op=LOAD Dec 13 14:49:18.901000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.901000 audit[3028]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3009 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:18.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065346532653030613036386364336539323332373231326163643837 Dec 13 14:49:18.903000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.903000 audit[3028]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=3009 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:18.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065346532653030613036386364336539323332373231326163643837 Dec 13 14:49:18.903000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.903000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.903000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.903000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.903000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.903000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.903000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.903000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.903000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.903000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.903000 audit: BPF prog-id=108 op=LOAD Dec 13 14:49:18.903000 audit[3028]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0000252b0 items=0 ppid=3009 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:18.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065346532653030613036386364336539323332373231326163643837 Dec 13 14:49:18.904000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.904000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.904000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.904000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.904000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.904000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.904000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.904000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.904000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.904000 audit: BPF prog-id=109 op=LOAD Dec 13 14:49:18.904000 audit[3028]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0000252f8 items=0 ppid=3009 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:18.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065346532653030613036386364336539323332373231326163643837 Dec 13 14:49:18.905000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:49:18.905000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:49:18.905000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.905000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.905000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.905000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.905000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.905000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.905000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.905000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.905000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.905000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.905000 audit: BPF prog-id=110 op=LOAD Dec 13 14:49:18.905000 audit[3028]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000025708 items=0 ppid=3009 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:18.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065346532653030613036386364336539323332373231326163643837 Dec 13 14:49:18.921868 systemd[1]: Started cri-containerd-9321dfa6a4cc79a651cebde3846c559887e6246de7cb7b4e75683726eb67d0c6.scope. Dec 13 14:49:18.960547 env[1768]: time="2024-12-13T14:49:18.960495604Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-vph2k,Uid:aa99f81a-e7e0-4707-8527-bfb039a24daa,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"0e4e2e00a068cd3e92327212acd87bcc3875ada9f10b69264ed2f4d10c79dd50\"" Dec 13 14:49:18.962000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.962000 audit[3051]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f957c8e59b8 items=0 ppid=2977 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:18.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933323164666136613463633739613635316365626465333834366335 Dec 13 14:49:18.962000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.962000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.962000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.962000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.962000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.962000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.962000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.962000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.962000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.962000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.962000 audit: BPF prog-id=111 op=LOAD Dec 13 14:49:18.962000 audit[3051]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000218bf8 items=0 ppid=2977 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:18.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933323164666136613463633739613635316365626465333834366335 Dec 13 14:49:18.963000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.963000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.963000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.963000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.963000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.963000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.963000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.963000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.963000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.963000 audit: BPF prog-id=112 op=LOAD Dec 13 14:49:18.963000 audit[3051]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000218c48 items=0 ppid=2977 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:18.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933323164666136613463633739613635316365626465333834366335 Dec 13 14:49:18.964000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:49:18.964000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:49:18.964000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.964000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.964000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.964000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.964000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.964000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.964000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.964000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.964000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.966754 env[1768]: time="2024-12-13T14:49:18.966458653Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:49:18.964000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:18.964000 audit: BPF prog-id=113 op=LOAD Dec 13 14:49:18.964000 audit[3051]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000218cd8 items=0 ppid=2977 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:18.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933323164666136613463633739613635316365626465333834366335 Dec 13 14:49:18.986085 env[1768]: time="2024-12-13T14:49:18.985970017Z" level=info msg="StartContainer for \"9321dfa6a4cc79a651cebde3846c559887e6246de7cb7b4e75683726eb67d0c6\" returns successfully" Dec 13 14:49:19.451000 audit[3117]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=3117 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:19.451000 audit[3117]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec7c68790 a2=0 a3=7ffec7c6877c items=0 ppid=3063 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.451000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:49:19.454000 audit[3118]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=3118 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:19.454000 audit[3118]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffdff3c60 a2=0 a3=7ffffdff3c4c items=0 ppid=3063 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:49:19.454000 audit[3119]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=3119 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:19.454000 audit[3119]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff75092f30 a2=0 a3=7fff75092f1c items=0 ppid=3063 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:49:19.455000 audit[3120]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=3120 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.455000 audit[3120]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc6db72bf0 a2=0 a3=7ffc6db72bdc items=0 ppid=3063 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.455000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:49:19.457000 audit[3121]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=3121 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.457000 audit[3121]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4693faf0 a2=0 a3=7ffc4693fadc items=0 ppid=3063 pid=3121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.457000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:49:19.458000 audit[3122]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=3122 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.458000 audit[3122]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd504d1110 a2=0 a3=7ffd504d10fc items=0 ppid=3063 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.458000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:49:19.564000 audit[3123]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3123 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:19.564000 audit[3123]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd58abfd00 a2=0 a3=7ffd58abfcec items=0 ppid=3063 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.564000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:49:19.571000 audit[3125]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3125 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:19.571000 audit[3125]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc38876520 a2=0 a3=7ffc3887650c items=0 ppid=3063 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.571000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:49:19.578000 audit[3128]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3128 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:19.578000 audit[3128]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd7f9ee550 a2=0 a3=7ffd7f9ee53c items=0 ppid=3063 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.578000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:49:19.579000 audit[3129]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3129 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:19.579000 audit[3129]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2973f7d0 a2=0 a3=7ffe2973f7bc items=0 ppid=3063 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.579000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:49:19.585000 audit[3131]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3131 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:19.585000 audit[3131]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc9c6eab20 a2=0 a3=7ffc9c6eab0c items=0 ppid=3063 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.585000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:49:19.587000 audit[3132]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3132 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:19.587000 audit[3132]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeaecca6d0 a2=0 a3=7ffeaecca6bc items=0 ppid=3063 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.587000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:49:19.590000 audit[3134]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3134 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:19.590000 audit[3134]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd4a956de0 a2=0 a3=7ffd4a956dcc items=0 ppid=3063 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.590000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:49:19.596000 audit[3137]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3137 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:19.596000 audit[3137]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcd4d2d2c0 a2=0 a3=7ffcd4d2d2ac items=0 ppid=3063 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.596000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:49:19.598000 audit[3138]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3138 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:19.598000 audit[3138]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdfb5d3bd0 a2=0 a3=7ffdfb5d3bbc items=0 ppid=3063 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.598000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:49:19.600000 audit[3140]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3140 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:19.600000 audit[3140]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeb4404e40 a2=0 a3=7ffeb4404e2c items=0 ppid=3063 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.600000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:49:19.602000 audit[3141]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3141 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:19.602000 audit[3141]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd5e8754b0 a2=0 a3=7ffd5e87549c items=0 ppid=3063 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.602000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:49:19.603000 audit[3143]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3143 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:19.603000 audit[3143]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc03807f50 a2=0 a3=7ffc03807f3c items=0 ppid=3063 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.603000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:49:19.608000 audit[3146]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3146 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:19.608000 audit[3146]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffccc9454e0 a2=0 a3=7ffccc9454cc items=0 ppid=3063 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.608000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:49:19.612000 audit[3149]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3149 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:19.612000 audit[3149]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd904635c0 a2=0 a3=7ffd904635ac items=0 ppid=3063 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.612000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:49:19.614000 audit[3150]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3150 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:19.614000 audit[3150]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd4146e4c0 a2=0 a3=7ffd4146e4ac items=0 ppid=3063 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.614000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:49:19.617000 audit[3152]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3152 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:19.617000 audit[3152]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd340712a0 a2=0 a3=7ffd3407128c items=0 ppid=3063 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.617000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:49:19.621000 audit[3155]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3155 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:19.621000 audit[3155]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc5bbaf00 a2=0 a3=7ffcc5bbaeec items=0 ppid=3063 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.621000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:49:19.628780 systemd[1]: run-containerd-runc-k8s.io-f16545432ec55de794fe373b774e48a726e14b6d0d08b08bb62a8a37fbd39246-runc.Bgac3G.mount: Deactivated successfully. Dec 13 14:49:19.631000 audit[3156]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3156 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:19.631000 audit[3156]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe020f5d60 a2=0 a3=7ffe020f5d4c items=0 ppid=3063 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.631000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:49:19.633000 audit[3158]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:49:19.633000 audit[3158]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff329f8400 a2=0 a3=7fff329f83ec items=0 ppid=3063 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.633000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:49:19.663000 audit[3164]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3164 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:49:19.663000 audit[3164]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcb1d12740 a2=0 a3=7ffcb1d1272c items=0 ppid=3063 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.663000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:19.673000 audit[3164]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3164 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:49:19.673000 audit[3164]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffcb1d12740 a2=0 a3=7ffcb1d1272c items=0 ppid=3063 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.673000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:19.675000 audit[3169]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3169 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.675000 audit[3169]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffced441520 a2=0 a3=7ffced44150c items=0 ppid=3063 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.675000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:49:19.678000 audit[3171]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3171 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.678000 audit[3171]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdf2a35250 a2=0 a3=7ffdf2a3523c items=0 ppid=3063 pid=3171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.678000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:49:19.689000 audit[3174]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3174 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.689000 audit[3174]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe87c69270 a2=0 a3=7ffe87c6925c items=0 ppid=3063 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.689000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:49:19.697000 audit[3175]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3175 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.697000 audit[3175]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec652ed70 a2=0 a3=7ffec652ed5c items=0 ppid=3063 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.697000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:49:19.706000 audit[3177]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3177 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.706000 audit[3177]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffce3c87dd0 a2=0 a3=7ffce3c87dbc items=0 ppid=3063 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.706000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:49:19.711000 audit[3178]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3178 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.711000 audit[3178]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff772285e0 a2=0 a3=7fff772285cc items=0 ppid=3063 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.711000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:49:19.720000 audit[3180]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3180 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.720000 audit[3180]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff6f172020 a2=0 a3=7fff6f17200c items=0 ppid=3063 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.720000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:49:19.725000 audit[3183]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3183 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.725000 audit[3183]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffbde9b6b0 a2=0 a3=7fffbde9b69c items=0 ppid=3063 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.725000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:49:19.725000 audit[3184]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3184 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.725000 audit[3184]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed8729110 a2=0 a3=7ffed87290fc items=0 ppid=3063 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.725000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:49:19.728000 audit[3186]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3186 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.728000 audit[3186]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc4f256bd0 a2=0 a3=7ffc4f256bbc items=0 ppid=3063 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.728000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:49:19.730000 audit[3187]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3187 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.730000 audit[3187]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc16079e30 a2=0 a3=7ffc16079e1c items=0 ppid=3063 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.730000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:49:19.733000 audit[3189]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3189 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.733000 audit[3189]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc4bc5b300 a2=0 a3=7ffc4bc5b2ec items=0 ppid=3063 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.733000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:49:19.737000 audit[3192]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3192 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.737000 audit[3192]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcda6fcba0 a2=0 a3=7ffcda6fcb8c items=0 ppid=3063 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.737000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:49:19.741000 audit[3195]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3195 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.741000 audit[3195]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffef3a63e50 a2=0 a3=7ffef3a63e3c items=0 ppid=3063 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.741000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:49:19.742000 audit[3196]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.742000 audit[3196]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdcd467950 a2=0 a3=7ffdcd46793c items=0 ppid=3063 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.742000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:49:19.745000 audit[3198]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.745000 audit[3198]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe46fc03c0 a2=0 a3=7ffe46fc03ac items=0 ppid=3063 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.745000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:49:19.748000 audit[3201]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3201 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.748000 audit[3201]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdb46d4490 a2=0 a3=7ffdb46d447c items=0 ppid=3063 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.748000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:49:19.750000 audit[3202]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3202 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.750000 audit[3202]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd768f120 a2=0 a3=7fffd768f10c items=0 ppid=3063 pid=3202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.750000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:49:19.752000 audit[3204]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3204 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.752000 audit[3204]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe6d4b70a0 a2=0 a3=7ffe6d4b708c items=0 ppid=3063 pid=3204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.752000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:49:19.753000 audit[3205]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3205 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.753000 audit[3205]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4272d500 a2=0 a3=7ffe4272d4ec items=0 ppid=3063 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:49:19.756000 audit[3207]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3207 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.756000 audit[3207]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffa2ebacf0 a2=0 a3=7fffa2ebacdc items=0 ppid=3063 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:49:19.761000 audit[3210]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3210 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:49:19.761000 audit[3210]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe3ccf7420 a2=0 a3=7ffe3ccf740c items=0 ppid=3063 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.761000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:49:19.764000 audit[3212]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:49:19.764000 audit[3212]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fffe9fcd810 a2=0 a3=7fffe9fcd7fc items=0 ppid=3063 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.764000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:19.764000 audit[3212]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:49:19.764000 audit[3212]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fffe9fcd810 a2=0 a3=7fffe9fcd7fc items=0 ppid=3063 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:19.764000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:23.726853 kubelet[2628]: I1213 14:49:23.726626 2628 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-xc79b" podStartSLOduration=6.726604613 podStartE2EDuration="6.726604613s" podCreationTimestamp="2024-12-13 14:49:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:49:19.588410425 +0000 UTC m=+6.374868349" watchObservedRunningTime="2024-12-13 14:49:23.726604613 +0000 UTC m=+10.513062538" Dec 13 14:49:23.732437 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3675731608.mount: Deactivated successfully. Dec 13 14:49:24.659663 env[1768]: time="2024-12-13T14:49:24.658862948Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:24.673974 env[1768]: time="2024-12-13T14:49:24.673925320Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:24.677382 env[1768]: time="2024-12-13T14:49:24.677324578Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:24.681772 env[1768]: time="2024-12-13T14:49:24.681714332Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:24.682185 env[1768]: time="2024-12-13T14:49:24.682149273Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 14:49:24.685367 env[1768]: time="2024-12-13T14:49:24.685321539Z" level=info msg="CreateContainer within sandbox \"0e4e2e00a068cd3e92327212acd87bcc3875ada9f10b69264ed2f4d10c79dd50\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:49:24.731133 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4002124263.mount: Deactivated successfully. Dec 13 14:49:24.774511 env[1768]: time="2024-12-13T14:49:24.774457977Z" level=info msg="CreateContainer within sandbox \"0e4e2e00a068cd3e92327212acd87bcc3875ada9f10b69264ed2f4d10c79dd50\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"a110282834ad59944db80a3450d6db83840e30ae0cc851ddb1a476cb2176d155\"" Dec 13 14:49:24.775132 env[1768]: time="2024-12-13T14:49:24.775010714Z" level=info msg="StartContainer for \"a110282834ad59944db80a3450d6db83840e30ae0cc851ddb1a476cb2176d155\"" Dec 13 14:49:24.806826 systemd[1]: Started cri-containerd-a110282834ad59944db80a3450d6db83840e30ae0cc851ddb1a476cb2176d155.scope. Dec 13 14:49:24.832087 kernel: kauditd_printk_skb: 305 callbacks suppressed Dec 13 14:49:24.832554 kernel: audit: type=1400 audit(1734101364.826:913): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.841375 kernel: audit: type=1400 audit(1734101364.826:914): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.841497 kernel: audit: type=1400 audit(1734101364.826:915): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.849680 kernel: audit: type=1400 audit(1734101364.826:916): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.849768 kernel: audit: type=1400 audit(1734101364.826:917): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.856817 kernel: audit: type=1400 audit(1734101364.826:918): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.856973 kernel: audit: type=1400 audit(1734101364.826:919): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.864379 kernel: audit: type=1400 audit(1734101364.826:920): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.864507 kernel: audit: type=1400 audit(1734101364.826:921): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.867676 kernel: audit: type=1400 audit(1734101364.832:922): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.832000 audit: BPF prog-id=114 op=LOAD Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3009 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:24.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131313032383238333461643539393434646238306133343530643664 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3009 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:24.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131313032383238333461643539393434646238306133343530643664 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit: BPF prog-id=115 op=LOAD Dec 13 14:49:24.833000 audit[3220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dd040 items=0 ppid=3009 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:24.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131313032383238333461643539393434646238306133343530643664 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit: BPF prog-id=116 op=LOAD Dec 13 14:49:24.833000 audit[3220]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001dd088 items=0 ppid=3009 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:24.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131313032383238333461643539393434646238306133343530643664 Dec 13 14:49:24.833000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:49:24.833000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:24.833000 audit: BPF prog-id=117 op=LOAD Dec 13 14:49:24.833000 audit[3220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001dd498 items=0 ppid=3009 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:24.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131313032383238333461643539393434646238306133343530643664 Dec 13 14:49:24.884074 env[1768]: time="2024-12-13T14:49:24.884025563Z" level=info msg="StartContainer for \"a110282834ad59944db80a3450d6db83840e30ae0cc851ddb1a476cb2176d155\" returns successfully" Dec 13 14:49:27.860000 audit[3255]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3255 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:49:27.860000 audit[3255]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe2c0a3500 a2=0 a3=7ffe2c0a34ec items=0 ppid=3063 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:27.860000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:27.864000 audit[3255]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3255 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:49:27.864000 audit[3255]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe2c0a3500 a2=0 a3=0 items=0 ppid=3063 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:27.864000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:27.872000 audit[3257]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3257 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:49:27.872000 audit[3257]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffe2a14240 a2=0 a3=7fffe2a1422c items=0 ppid=3063 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:27.872000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:27.876000 audit[3257]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3257 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:49:27.876000 audit[3257]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffe2a14240 a2=0 a3=0 items=0 ppid=3063 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:27.876000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:28.031331 kubelet[2628]: I1213 14:49:28.031096 2628 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4976dd7-vph2k" podStartSLOduration=4.310372747 podStartE2EDuration="10.031071568s" podCreationTimestamp="2024-12-13 14:49:18 +0000 UTC" firstStartedPulling="2024-12-13 14:49:18.963158775 +0000 UTC m=+5.749616677" lastFinishedPulling="2024-12-13 14:49:24.683857579 +0000 UTC m=+11.470315498" observedRunningTime="2024-12-13 14:49:25.624780008 +0000 UTC m=+12.411237935" watchObservedRunningTime="2024-12-13 14:49:28.031071568 +0000 UTC m=+14.817529525" Dec 13 14:49:28.040018 systemd[1]: Created slice kubepods-besteffort-pod895c0e05_d554_45b9_b1b4_8f640c198e6a.slice. Dec 13 14:49:28.188292 kubelet[2628]: I1213 14:49:28.188229 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/895c0e05-d554-45b9-b1b4-8f640c198e6a-tigera-ca-bundle\") pod \"calico-typha-5947f9c6ff-nd22b\" (UID: \"895c0e05-d554-45b9-b1b4-8f640c198e6a\") " pod="calico-system/calico-typha-5947f9c6ff-nd22b" Dec 13 14:49:28.188498 kubelet[2628]: I1213 14:49:28.188303 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/895c0e05-d554-45b9-b1b4-8f640c198e6a-typha-certs\") pod \"calico-typha-5947f9c6ff-nd22b\" (UID: \"895c0e05-d554-45b9-b1b4-8f640c198e6a\") " pod="calico-system/calico-typha-5947f9c6ff-nd22b" Dec 13 14:49:28.188498 kubelet[2628]: I1213 14:49:28.188338 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5mkjr\" (UniqueName: \"kubernetes.io/projected/895c0e05-d554-45b9-b1b4-8f640c198e6a-kube-api-access-5mkjr\") pod \"calico-typha-5947f9c6ff-nd22b\" (UID: \"895c0e05-d554-45b9-b1b4-8f640c198e6a\") " pod="calico-system/calico-typha-5947f9c6ff-nd22b" Dec 13 14:49:28.291805 systemd[1]: Created slice kubepods-besteffort-pod2faa7be8_78df_455a_bd2b_a1785376cae1.slice. Dec 13 14:49:28.389059 kubelet[2628]: I1213 14:49:28.389011 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/2faa7be8-78df-455a-bd2b-a1785376cae1-var-lib-calico\") pod \"calico-node-56rk2\" (UID: \"2faa7be8-78df-455a-bd2b-a1785376cae1\") " pod="calico-system/calico-node-56rk2" Dec 13 14:49:28.389059 kubelet[2628]: I1213 14:49:28.389059 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/2faa7be8-78df-455a-bd2b-a1785376cae1-cni-bin-dir\") pod \"calico-node-56rk2\" (UID: \"2faa7be8-78df-455a-bd2b-a1785376cae1\") " pod="calico-system/calico-node-56rk2" Dec 13 14:49:28.389386 kubelet[2628]: I1213 14:49:28.389085 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2faa7be8-78df-455a-bd2b-a1785376cae1-xtables-lock\") pod \"calico-node-56rk2\" (UID: \"2faa7be8-78df-455a-bd2b-a1785376cae1\") " pod="calico-system/calico-node-56rk2" Dec 13 14:49:28.389386 kubelet[2628]: I1213 14:49:28.389107 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/2faa7be8-78df-455a-bd2b-a1785376cae1-node-certs\") pod \"calico-node-56rk2\" (UID: \"2faa7be8-78df-455a-bd2b-a1785376cae1\") " pod="calico-system/calico-node-56rk2" Dec 13 14:49:28.389386 kubelet[2628]: I1213 14:49:28.389128 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2faa7be8-78df-455a-bd2b-a1785376cae1-lib-modules\") pod \"calico-node-56rk2\" (UID: \"2faa7be8-78df-455a-bd2b-a1785376cae1\") " pod="calico-system/calico-node-56rk2" Dec 13 14:49:28.389386 kubelet[2628]: I1213 14:49:28.389149 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/2faa7be8-78df-455a-bd2b-a1785376cae1-policysync\") pod \"calico-node-56rk2\" (UID: \"2faa7be8-78df-455a-bd2b-a1785376cae1\") " pod="calico-system/calico-node-56rk2" Dec 13 14:49:28.389386 kubelet[2628]: I1213 14:49:28.389168 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/2faa7be8-78df-455a-bd2b-a1785376cae1-cni-log-dir\") pod \"calico-node-56rk2\" (UID: \"2faa7be8-78df-455a-bd2b-a1785376cae1\") " pod="calico-system/calico-node-56rk2" Dec 13 14:49:28.389601 kubelet[2628]: I1213 14:49:28.389199 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/2faa7be8-78df-455a-bd2b-a1785376cae1-flexvol-driver-host\") pod \"calico-node-56rk2\" (UID: \"2faa7be8-78df-455a-bd2b-a1785376cae1\") " pod="calico-system/calico-node-56rk2" Dec 13 14:49:28.389601 kubelet[2628]: I1213 14:49:28.389226 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/2faa7be8-78df-455a-bd2b-a1785376cae1-cni-net-dir\") pod \"calico-node-56rk2\" (UID: \"2faa7be8-78df-455a-bd2b-a1785376cae1\") " pod="calico-system/calico-node-56rk2" Dec 13 14:49:28.389601 kubelet[2628]: I1213 14:49:28.389251 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2faa7be8-78df-455a-bd2b-a1785376cae1-tigera-ca-bundle\") pod \"calico-node-56rk2\" (UID: \"2faa7be8-78df-455a-bd2b-a1785376cae1\") " pod="calico-system/calico-node-56rk2" Dec 13 14:49:28.389601 kubelet[2628]: I1213 14:49:28.389288 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-49ndd\" (UniqueName: \"kubernetes.io/projected/2faa7be8-78df-455a-bd2b-a1785376cae1-kube-api-access-49ndd\") pod \"calico-node-56rk2\" (UID: \"2faa7be8-78df-455a-bd2b-a1785376cae1\") " pod="calico-system/calico-node-56rk2" Dec 13 14:49:28.389601 kubelet[2628]: I1213 14:49:28.389313 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/2faa7be8-78df-455a-bd2b-a1785376cae1-var-run-calico\") pod \"calico-node-56rk2\" (UID: \"2faa7be8-78df-455a-bd2b-a1785376cae1\") " pod="calico-system/calico-node-56rk2" Dec 13 14:49:28.493001 kubelet[2628]: E1213 14:49:28.492864 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.493001 kubelet[2628]: W1213 14:49:28.492904 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.493001 kubelet[2628]: E1213 14:49:28.492981 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.494517 kubelet[2628]: E1213 14:49:28.493305 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.494517 kubelet[2628]: W1213 14:49:28.493321 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.494517 kubelet[2628]: E1213 14:49:28.493416 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.494517 kubelet[2628]: E1213 14:49:28.493555 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.494517 kubelet[2628]: W1213 14:49:28.493578 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.494517 kubelet[2628]: E1213 14:49:28.493663 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.494517 kubelet[2628]: E1213 14:49:28.493842 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.494517 kubelet[2628]: W1213 14:49:28.493852 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.494517 kubelet[2628]: E1213 14:49:28.493952 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.494517 kubelet[2628]: E1213 14:49:28.494202 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.495119 kubelet[2628]: W1213 14:49:28.494213 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.495119 kubelet[2628]: E1213 14:49:28.494317 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.495119 kubelet[2628]: E1213 14:49:28.494448 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.495119 kubelet[2628]: W1213 14:49:28.494459 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.495119 kubelet[2628]: E1213 14:49:28.494537 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.495119 kubelet[2628]: E1213 14:49:28.494660 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.495119 kubelet[2628]: W1213 14:49:28.494667 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.495119 kubelet[2628]: E1213 14:49:28.494746 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.495119 kubelet[2628]: E1213 14:49:28.494861 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.495119 kubelet[2628]: W1213 14:49:28.494872 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.495718 kubelet[2628]: E1213 14:49:28.494949 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.495718 kubelet[2628]: E1213 14:49:28.495066 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.495718 kubelet[2628]: W1213 14:49:28.495073 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.495718 kubelet[2628]: E1213 14:49:28.495248 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.495718 kubelet[2628]: E1213 14:49:28.495403 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.495718 kubelet[2628]: W1213 14:49:28.495413 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.495718 kubelet[2628]: E1213 14:49:28.495494 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.495718 kubelet[2628]: E1213 14:49:28.495612 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.495718 kubelet[2628]: W1213 14:49:28.495619 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.495718 kubelet[2628]: E1213 14:49:28.495694 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.496177 kubelet[2628]: E1213 14:49:28.495837 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.496177 kubelet[2628]: W1213 14:49:28.495845 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.496177 kubelet[2628]: E1213 14:49:28.495917 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.496177 kubelet[2628]: E1213 14:49:28.496029 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.496177 kubelet[2628]: W1213 14:49:28.496036 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.496177 kubelet[2628]: E1213 14:49:28.496109 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.496571 kubelet[2628]: E1213 14:49:28.496221 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.496571 kubelet[2628]: W1213 14:49:28.496228 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.496571 kubelet[2628]: E1213 14:49:28.496404 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.496571 kubelet[2628]: E1213 14:49:28.496561 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.496571 kubelet[2628]: W1213 14:49:28.496570 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.496864 kubelet[2628]: E1213 14:49:28.496650 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.496864 kubelet[2628]: E1213 14:49:28.496767 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.496864 kubelet[2628]: W1213 14:49:28.496775 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.497071 kubelet[2628]: E1213 14:49:28.496913 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.497129 kubelet[2628]: E1213 14:49:28.497099 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.497129 kubelet[2628]: W1213 14:49:28.497109 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.497226 kubelet[2628]: E1213 14:49:28.497193 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.498285 kubelet[2628]: E1213 14:49:28.497359 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.498285 kubelet[2628]: W1213 14:49:28.497369 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.498285 kubelet[2628]: E1213 14:49:28.497479 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.498285 kubelet[2628]: E1213 14:49:28.497610 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.498285 kubelet[2628]: W1213 14:49:28.497618 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.498285 kubelet[2628]: E1213 14:49:28.497704 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.498285 kubelet[2628]: E1213 14:49:28.497896 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.498285 kubelet[2628]: W1213 14:49:28.497906 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.498285 kubelet[2628]: E1213 14:49:28.498027 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.498720 kubelet[2628]: E1213 14:49:28.498369 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.498720 kubelet[2628]: W1213 14:49:28.498379 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.498720 kubelet[2628]: E1213 14:49:28.498465 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.498720 kubelet[2628]: E1213 14:49:28.498596 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.498720 kubelet[2628]: W1213 14:49:28.498604 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.498720 kubelet[2628]: E1213 14:49:28.498677 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.498996 kubelet[2628]: E1213 14:49:28.498805 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.498996 kubelet[2628]: W1213 14:49:28.498813 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.498996 kubelet[2628]: E1213 14:49:28.498892 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.499129 kubelet[2628]: E1213 14:49:28.499053 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.499129 kubelet[2628]: W1213 14:49:28.499062 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.499232 kubelet[2628]: E1213 14:49:28.499140 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.500703 kubelet[2628]: E1213 14:49:28.500684 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.500703 kubelet[2628]: W1213 14:49:28.500701 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.500926 kubelet[2628]: E1213 14:49:28.500858 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.501029 kubelet[2628]: E1213 14:49:28.501013 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.501091 kubelet[2628]: W1213 14:49:28.501029 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.501163 kubelet[2628]: E1213 14:49:28.501148 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.501376 kubelet[2628]: E1213 14:49:28.501361 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.501450 kubelet[2628]: W1213 14:49:28.501376 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.501501 kubelet[2628]: E1213 14:49:28.501483 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.501648 kubelet[2628]: E1213 14:49:28.501629 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.501732 kubelet[2628]: W1213 14:49:28.501653 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.502085 kubelet[2628]: E1213 14:49:28.501777 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.502284 kubelet[2628]: E1213 14:49:28.502204 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.502284 kubelet[2628]: W1213 14:49:28.502220 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.505067 kubelet[2628]: E1213 14:49:28.502434 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.505067 kubelet[2628]: W1213 14:49:28.502448 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.505067 kubelet[2628]: E1213 14:49:28.502657 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.505067 kubelet[2628]: W1213 14:49:28.502666 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.505067 kubelet[2628]: E1213 14:49:28.502857 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.505067 kubelet[2628]: W1213 14:49:28.502866 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.505067 kubelet[2628]: E1213 14:49:28.503058 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.505067 kubelet[2628]: W1213 14:49:28.503066 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.505067 kubelet[2628]: E1213 14:49:28.503078 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.505067 kubelet[2628]: E1213 14:49:28.503104 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.505599 kubelet[2628]: E1213 14:49:28.503120 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.505599 kubelet[2628]: E1213 14:49:28.503134 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.505599 kubelet[2628]: E1213 14:49:28.503146 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.518401 kubelet[2628]: E1213 14:49:28.517252 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.518401 kubelet[2628]: W1213 14:49:28.517304 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.518401 kubelet[2628]: E1213 14:49:28.517331 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.534372 kubelet[2628]: E1213 14:49:28.534344 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.534372 kubelet[2628]: W1213 14:49:28.534368 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.534548 kubelet[2628]: E1213 14:49:28.534390 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.587665 kubelet[2628]: E1213 14:49:28.587610 2628 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5dmvf" podUID="4829ad21-050f-4e15-8ac8-fbe8a63d9b6a" Dec 13 14:49:28.591463 kubelet[2628]: E1213 14:49:28.591433 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.591655 kubelet[2628]: W1213 14:49:28.591637 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.591754 kubelet[2628]: E1213 14:49:28.591741 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.592058 kubelet[2628]: E1213 14:49:28.592047 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.592146 kubelet[2628]: W1213 14:49:28.592135 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.592232 kubelet[2628]: E1213 14:49:28.592221 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.592532 kubelet[2628]: E1213 14:49:28.592519 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.592664 kubelet[2628]: W1213 14:49:28.592651 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.592754 kubelet[2628]: E1213 14:49:28.592742 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.593098 kubelet[2628]: E1213 14:49:28.593085 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.593188 kubelet[2628]: W1213 14:49:28.593176 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.593288 kubelet[2628]: E1213 14:49:28.593275 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.593569 kubelet[2628]: E1213 14:49:28.593558 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.593667 kubelet[2628]: W1213 14:49:28.593654 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.593780 kubelet[2628]: E1213 14:49:28.593729 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.594099 kubelet[2628]: E1213 14:49:28.594086 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.594198 kubelet[2628]: W1213 14:49:28.594186 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.594294 kubelet[2628]: E1213 14:49:28.594279 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.594608 kubelet[2628]: E1213 14:49:28.594595 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.594771 kubelet[2628]: W1213 14:49:28.594755 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.594873 kubelet[2628]: E1213 14:49:28.594859 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.595233 kubelet[2628]: E1213 14:49:28.595220 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.595375 kubelet[2628]: W1213 14:49:28.595361 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.595475 kubelet[2628]: E1213 14:49:28.595462 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.595750 kubelet[2628]: E1213 14:49:28.595738 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.595910 kubelet[2628]: W1213 14:49:28.595895 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.595997 kubelet[2628]: E1213 14:49:28.595986 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.596250 kubelet[2628]: E1213 14:49:28.596237 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.596367 kubelet[2628]: W1213 14:49:28.596353 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.596444 kubelet[2628]: E1213 14:49:28.596432 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.596772 kubelet[2628]: E1213 14:49:28.596760 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.596929 kubelet[2628]: W1213 14:49:28.596915 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.597012 kubelet[2628]: E1213 14:49:28.597000 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.597364 kubelet[2628]: E1213 14:49:28.597345 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.597501 kubelet[2628]: W1213 14:49:28.597488 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.597591 kubelet[2628]: E1213 14:49:28.597579 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.597930 kubelet[2628]: E1213 14:49:28.597919 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.598025 kubelet[2628]: W1213 14:49:28.598014 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.598104 kubelet[2628]: E1213 14:49:28.598090 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.600387 kubelet[2628]: E1213 14:49:28.600371 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.600554 kubelet[2628]: W1213 14:49:28.600474 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.600665 kubelet[2628]: E1213 14:49:28.600633 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.601075 kubelet[2628]: E1213 14:49:28.601058 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.601075 kubelet[2628]: W1213 14:49:28.601075 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.601203 kubelet[2628]: E1213 14:49:28.601089 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.601407 kubelet[2628]: E1213 14:49:28.601339 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.601407 kubelet[2628]: W1213 14:49:28.601354 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.601407 kubelet[2628]: E1213 14:49:28.601366 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.601593 kubelet[2628]: E1213 14:49:28.601565 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.601593 kubelet[2628]: W1213 14:49:28.601575 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.601593 kubelet[2628]: E1213 14:49:28.601588 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.601783 kubelet[2628]: E1213 14:49:28.601770 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.601835 kubelet[2628]: W1213 14:49:28.601784 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.601835 kubelet[2628]: E1213 14:49:28.601796 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.601973 kubelet[2628]: E1213 14:49:28.601959 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.602028 kubelet[2628]: W1213 14:49:28.601975 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.602028 kubelet[2628]: E1213 14:49:28.601986 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.602169 kubelet[2628]: E1213 14:49:28.602153 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.602169 kubelet[2628]: W1213 14:49:28.602169 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.602287 kubelet[2628]: E1213 14:49:28.602180 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.615470 env[1768]: time="2024-12-13T14:49:28.614943587Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-56rk2,Uid:2faa7be8-78df-455a-bd2b-a1785376cae1,Namespace:calico-system,Attempt:0,}" Dec 13 14:49:28.646342 env[1768]: time="2024-12-13T14:49:28.646238175Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:49:28.646494 env[1768]: time="2024-12-13T14:49:28.646316664Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:49:28.646494 env[1768]: time="2024-12-13T14:49:28.646332935Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:49:28.646642 env[1768]: time="2024-12-13T14:49:28.646538012Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/25a4f59faf8ecc86e738aa006eb4a66e5b8377cb4d6b0deb68e9fdabc60c3c19 pid=3326 runtime=io.containerd.runc.v2 Dec 13 14:49:28.650563 env[1768]: time="2024-12-13T14:49:28.650522815Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5947f9c6ff-nd22b,Uid:895c0e05-d554-45b9-b1b4-8f640c198e6a,Namespace:calico-system,Attempt:0,}" Dec 13 14:49:28.673518 systemd[1]: Started cri-containerd-25a4f59faf8ecc86e738aa006eb4a66e5b8377cb4d6b0deb68e9fdabc60c3c19.scope. Dec 13 14:49:28.694016 kubelet[2628]: E1213 14:49:28.692543 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.694016 kubelet[2628]: W1213 14:49:28.692570 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.694016 kubelet[2628]: E1213 14:49:28.692595 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.694016 kubelet[2628]: I1213 14:49:28.692628 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/4829ad21-050f-4e15-8ac8-fbe8a63d9b6a-varrun\") pod \"csi-node-driver-5dmvf\" (UID: \"4829ad21-050f-4e15-8ac8-fbe8a63d9b6a\") " pod="calico-system/csi-node-driver-5dmvf" Dec 13 14:49:28.694016 kubelet[2628]: E1213 14:49:28.692991 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.694016 kubelet[2628]: W1213 14:49:28.693051 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.694016 kubelet[2628]: E1213 14:49:28.693070 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.694016 kubelet[2628]: I1213 14:49:28.693098 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/4829ad21-050f-4e15-8ac8-fbe8a63d9b6a-kubelet-dir\") pod \"csi-node-driver-5dmvf\" (UID: \"4829ad21-050f-4e15-8ac8-fbe8a63d9b6a\") " pod="calico-system/csi-node-driver-5dmvf" Dec 13 14:49:28.694016 kubelet[2628]: E1213 14:49:28.693575 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.694904 kubelet[2628]: W1213 14:49:28.693590 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.694904 kubelet[2628]: E1213 14:49:28.693606 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.694904 kubelet[2628]: I1213 14:49:28.693629 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/4829ad21-050f-4e15-8ac8-fbe8a63d9b6a-socket-dir\") pod \"csi-node-driver-5dmvf\" (UID: \"4829ad21-050f-4e15-8ac8-fbe8a63d9b6a\") " pod="calico-system/csi-node-driver-5dmvf" Dec 13 14:49:28.694904 kubelet[2628]: E1213 14:49:28.693865 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.694904 kubelet[2628]: W1213 14:49:28.693875 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.694904 kubelet[2628]: E1213 14:49:28.693886 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.694904 kubelet[2628]: I1213 14:49:28.693918 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-whdqc\" (UniqueName: \"kubernetes.io/projected/4829ad21-050f-4e15-8ac8-fbe8a63d9b6a-kube-api-access-whdqc\") pod \"csi-node-driver-5dmvf\" (UID: \"4829ad21-050f-4e15-8ac8-fbe8a63d9b6a\") " pod="calico-system/csi-node-driver-5dmvf" Dec 13 14:49:28.694904 kubelet[2628]: E1213 14:49:28.694456 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.695253 kubelet[2628]: W1213 14:49:28.694469 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.695253 kubelet[2628]: E1213 14:49:28.694484 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.695253 kubelet[2628]: I1213 14:49:28.694518 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/4829ad21-050f-4e15-8ac8-fbe8a63d9b6a-registration-dir\") pod \"csi-node-driver-5dmvf\" (UID: \"4829ad21-050f-4e15-8ac8-fbe8a63d9b6a\") " pod="calico-system/csi-node-driver-5dmvf" Dec 13 14:49:28.696193 kubelet[2628]: E1213 14:49:28.695613 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.696193 kubelet[2628]: W1213 14:49:28.695630 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.696193 kubelet[2628]: E1213 14:49:28.695645 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.696193 kubelet[2628]: E1213 14:49:28.695856 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.696193 kubelet[2628]: W1213 14:49:28.695866 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.696193 kubelet[2628]: E1213 14:49:28.695886 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.696709 kubelet[2628]: E1213 14:49:28.696361 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.696709 kubelet[2628]: W1213 14:49:28.696373 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.696709 kubelet[2628]: E1213 14:49:28.696386 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.697183 kubelet[2628]: E1213 14:49:28.697066 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.697183 kubelet[2628]: W1213 14:49:28.697081 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.697183 kubelet[2628]: E1213 14:49:28.697095 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.698639 kubelet[2628]: E1213 14:49:28.698616 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.698833 kubelet[2628]: W1213 14:49:28.698719 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.698833 kubelet[2628]: E1213 14:49:28.698746 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.699100 kubelet[2628]: E1213 14:49:28.699080 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.699199 kubelet[2628]: W1213 14:49:28.699186 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.699558 kubelet[2628]: E1213 14:49:28.699536 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.699668 kubelet[2628]: W1213 14:49:28.699654 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.699966 kubelet[2628]: E1213 14:49:28.699953 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.700074 kubelet[2628]: W1213 14:49:28.700061 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.700174 kubelet[2628]: E1213 14:49:28.700163 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.700290 kubelet[2628]: E1213 14:49:28.700255 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.700598 kubelet[2628]: E1213 14:49:28.700586 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.700711 kubelet[2628]: W1213 14:49:28.700698 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.700859 kubelet[2628]: E1213 14:49:28.700844 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.700946 kubelet[2628]: E1213 14:49:28.700934 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.701210 kubelet[2628]: E1213 14:49:28.701197 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.701341 kubelet[2628]: W1213 14:49:28.701327 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.701437 kubelet[2628]: E1213 14:49:28.701425 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.721116 env[1768]: time="2024-12-13T14:49:28.720977709Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:49:28.721292 env[1768]: time="2024-12-13T14:49:28.721143620Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:49:28.721292 env[1768]: time="2024-12-13T14:49:28.721178647Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:49:28.721518 env[1768]: time="2024-12-13T14:49:28.721420265Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4f612cbe67a734ec19c988f5621be28a5bf5139bb2dd98605d8cbebb452ef48f pid=3360 runtime=io.containerd.runc.v2 Dec 13 14:49:28.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.726000 audit: BPF prog-id=118 op=LOAD Dec 13 14:49:28.728000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.728000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3326 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:28.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235613466353966616638656363383665373338616130303665623461 Dec 13 14:49:28.728000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.728000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3326 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:28.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235613466353966616638656363383665373338616130303665623461 Dec 13 14:49:28.728000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.728000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.728000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.728000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.728000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.728000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.728000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.728000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.728000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.728000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.728000 audit: BPF prog-id=119 op=LOAD Dec 13 14:49:28.728000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000310a00 items=0 ppid=3326 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:28.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235613466353966616638656363383665373338616130303665623461 Dec 13 14:49:28.728000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.728000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.728000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.728000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.728000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.728000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.728000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.728000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.728000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.728000 audit: BPF prog-id=120 op=LOAD Dec 13 14:49:28.728000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000310a48 items=0 ppid=3326 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:28.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235613466353966616638656363383665373338616130303665623461 Dec 13 14:49:28.729000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:49:28.729000 audit: BPF prog-id=119 op=UNLOAD Dec 13 14:49:28.729000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.729000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.729000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.729000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.729000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.729000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.729000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.729000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.729000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.729000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.729000 audit: BPF prog-id=121 op=LOAD Dec 13 14:49:28.729000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000310e58 items=0 ppid=3326 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:28.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235613466353966616638656363383665373338616130303665623461 Dec 13 14:49:28.774589 env[1768]: time="2024-12-13T14:49:28.774462305Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-56rk2,Uid:2faa7be8-78df-455a-bd2b-a1785376cae1,Namespace:calico-system,Attempt:0,} returns sandbox id \"25a4f59faf8ecc86e738aa006eb4a66e5b8377cb4d6b0deb68e9fdabc60c3c19\"" Dec 13 14:49:28.789942 systemd[1]: Started cri-containerd-4f612cbe67a734ec19c988f5621be28a5bf5139bb2dd98605d8cbebb452ef48f.scope. Dec 13 14:49:28.797435 kubelet[2628]: E1213 14:49:28.797412 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.797934 kubelet[2628]: W1213 14:49:28.797620 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.797934 kubelet[2628]: E1213 14:49:28.797648 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.798545 kubelet[2628]: E1213 14:49:28.798530 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.798651 kubelet[2628]: W1213 14:49:28.798634 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.798760 kubelet[2628]: E1213 14:49:28.798746 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.799499 kubelet[2628]: E1213 14:49:28.799485 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.799631 kubelet[2628]: W1213 14:49:28.799617 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.799730 kubelet[2628]: E1213 14:49:28.799717 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.800202 kubelet[2628]: E1213 14:49:28.800188 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.800510 kubelet[2628]: W1213 14:49:28.800493 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.800631 kubelet[2628]: E1213 14:49:28.800618 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.801374 kubelet[2628]: E1213 14:49:28.801359 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.801477 kubelet[2628]: W1213 14:49:28.801465 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.801573 kubelet[2628]: E1213 14:49:28.801562 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.802007 kubelet[2628]: E1213 14:49:28.801993 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.802112 kubelet[2628]: W1213 14:49:28.802100 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.802209 kubelet[2628]: E1213 14:49:28.802198 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.802710 kubelet[2628]: E1213 14:49:28.802687 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.802858 kubelet[2628]: W1213 14:49:28.802844 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.803010 kubelet[2628]: E1213 14:49:28.802946 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.803388 kubelet[2628]: E1213 14:49:28.803367 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.803557 kubelet[2628]: W1213 14:49:28.803543 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.803897 kubelet[2628]: E1213 14:49:28.803811 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.806686 kubelet[2628]: E1213 14:49:28.806670 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.806819 kubelet[2628]: W1213 14:49:28.806802 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.806925 kubelet[2628]: E1213 14:49:28.806913 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.807417 kubelet[2628]: E1213 14:49:28.807402 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.807532 kubelet[2628]: W1213 14:49:28.807519 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.807637 kubelet[2628]: E1213 14:49:28.807624 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.808543 env[1768]: time="2024-12-13T14:49:28.808504955Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:49:28.809373 kubelet[2628]: E1213 14:49:28.807986 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.809553 kubelet[2628]: W1213 14:49:28.809527 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.809675 kubelet[2628]: E1213 14:49:28.809660 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.809935 kubelet[2628]: E1213 14:49:28.809918 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.810004 kubelet[2628]: W1213 14:49:28.809936 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.810004 kubelet[2628]: E1213 14:49:28.809969 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.810463 kubelet[2628]: E1213 14:49:28.810447 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.810555 kubelet[2628]: W1213 14:49:28.810464 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.810661 kubelet[2628]: E1213 14:49:28.810643 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.810752 kubelet[2628]: E1213 14:49:28.810690 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.811536 kubelet[2628]: W1213 14:49:28.811518 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.811761 kubelet[2628]: E1213 14:49:28.811747 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.813571 kubelet[2628]: E1213 14:49:28.813552 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.813571 kubelet[2628]: W1213 14:49:28.813571 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.813795 kubelet[2628]: E1213 14:49:28.813774 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.813795 kubelet[2628]: W1213 14:49:28.813788 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.813967 kubelet[2628]: E1213 14:49:28.813955 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.814055 kubelet[2628]: W1213 14:49:28.813967 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.814150 kubelet[2628]: E1213 14:49:28.814137 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.814365 kubelet[2628]: W1213 14:49:28.814151 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.814365 kubelet[2628]: E1213 14:49:28.814163 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.814574 kubelet[2628]: E1213 14:49:28.814559 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.814646 kubelet[2628]: W1213 14:49:28.814575 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.814646 kubelet[2628]: E1213 14:49:28.814588 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.814825 kubelet[2628]: E1213 14:49:28.814808 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.815017 kubelet[2628]: E1213 14:49:28.815003 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.815077 kubelet[2628]: W1213 14:49:28.815019 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.815077 kubelet[2628]: E1213 14:49:28.815031 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.815540 kubelet[2628]: E1213 14:49:28.815518 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.815661 kubelet[2628]: E1213 14:49:28.815648 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.817144 kubelet[2628]: E1213 14:49:28.815256 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.817350 kubelet[2628]: W1213 14:49:28.817155 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.817350 kubelet[2628]: E1213 14:49:28.817178 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.817730 kubelet[2628]: E1213 14:49:28.817717 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.818218 kubelet[2628]: W1213 14:49:28.818201 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.818468 kubelet[2628]: E1213 14:49:28.818453 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.819312 kubelet[2628]: E1213 14:49:28.819298 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.819540 kubelet[2628]: W1213 14:49:28.819525 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.819689 kubelet[2628]: E1213 14:49:28.819656 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.822993 kubelet[2628]: E1213 14:49:28.822975 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.823195 kubelet[2628]: W1213 14:49:28.823105 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.823309 kubelet[2628]: E1213 14:49:28.823295 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.823741 kubelet[2628]: E1213 14:49:28.823728 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.823867 kubelet[2628]: W1213 14:49:28.823854 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.823954 kubelet[2628]: E1213 14:49:28.823943 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.844985 kubelet[2628]: E1213 14:49:28.844959 2628 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:49:28.845162 kubelet[2628]: W1213 14:49:28.845144 2628 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:49:28.845378 kubelet[2628]: E1213 14:49:28.845358 2628 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:49:28.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.855000 audit: BPF prog-id=122 op=LOAD Dec 13 14:49:28.856000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.856000 audit[3381]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3360 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:28.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466363132636265363761373334656331396339383866353632316265 Dec 13 14:49:28.857000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.857000 audit[3381]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3360 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:28.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466363132636265363761373334656331396339383866353632316265 Dec 13 14:49:28.857000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.857000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.857000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.857000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.857000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.857000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.857000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.857000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.857000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.857000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.857000 audit: BPF prog-id=123 op=LOAD Dec 13 14:49:28.857000 audit[3381]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000286170 items=0 ppid=3360 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:28.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466363132636265363761373334656331396339383866353632316265 Dec 13 14:49:28.859000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.859000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.859000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.859000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.859000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.859000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.859000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.859000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.859000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.859000 audit: BPF prog-id=124 op=LOAD Dec 13 14:49:28.859000 audit[3381]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002861b8 items=0 ppid=3360 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:28.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466363132636265363761373334656331396339383866353632316265 Dec 13 14:49:28.866000 audit: BPF prog-id=124 op=UNLOAD Dec 13 14:49:28.866000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:49:28.866000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.866000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.866000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.866000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.866000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.866000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.866000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.866000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.866000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.866000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:28.866000 audit: BPF prog-id=125 op=LOAD Dec 13 14:49:28.866000 audit[3381]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002865c8 items=0 ppid=3360 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:28.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466363132636265363761373334656331396339383866353632316265 Dec 13 14:49:28.891000 audit[3437]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=3437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:49:28.891000 audit[3437]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffd0217b2d0 a2=0 a3=7ffd0217b2bc items=0 ppid=3063 pid=3437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:28.891000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:28.895000 audit[3437]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:49:28.895000 audit[3437]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd0217b2d0 a2=0 a3=0 items=0 ppid=3063 pid=3437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:28.895000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:28.934513 env[1768]: time="2024-12-13T14:49:28.934468046Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5947f9c6ff-nd22b,Uid:895c0e05-d554-45b9-b1b4-8f640c198e6a,Namespace:calico-system,Attempt:0,} returns sandbox id \"4f612cbe67a734ec19c988f5621be28a5bf5139bb2dd98605d8cbebb452ef48f\"" Dec 13 14:49:30.400897 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3467072915.mount: Deactivated successfully. Dec 13 14:49:30.497009 kubelet[2628]: E1213 14:49:30.496964 2628 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5dmvf" podUID="4829ad21-050f-4e15-8ac8-fbe8a63d9b6a" Dec 13 14:49:30.600305 env[1768]: time="2024-12-13T14:49:30.600079575Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:30.606089 env[1768]: time="2024-12-13T14:49:30.606034050Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:30.609713 env[1768]: time="2024-12-13T14:49:30.609518425Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:30.613006 env[1768]: time="2024-12-13T14:49:30.612963263Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:30.614063 env[1768]: time="2024-12-13T14:49:30.614025178Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:49:30.615590 env[1768]: time="2024-12-13T14:49:30.615563512Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:49:30.617216 env[1768]: time="2024-12-13T14:49:30.617082124Z" level=info msg="CreateContainer within sandbox \"25a4f59faf8ecc86e738aa006eb4a66e5b8377cb4d6b0deb68e9fdabc60c3c19\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:49:30.644206 env[1768]: time="2024-12-13T14:49:30.644158196Z" level=info msg="CreateContainer within sandbox \"25a4f59faf8ecc86e738aa006eb4a66e5b8377cb4d6b0deb68e9fdabc60c3c19\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"414cd7cfba81e39247ab9077090563e981cbee34c6b66ec96f34e2bc14f32238\"" Dec 13 14:49:30.645342 env[1768]: time="2024-12-13T14:49:30.645306837Z" level=info msg="StartContainer for \"414cd7cfba81e39247ab9077090563e981cbee34c6b66ec96f34e2bc14f32238\"" Dec 13 14:49:30.686114 systemd[1]: Started cri-containerd-414cd7cfba81e39247ab9077090563e981cbee34c6b66ec96f34e2bc14f32238.scope. Dec 13 14:49:30.726863 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 14:49:30.726999 kernel: audit: type=1400 audit(1734101370.720:973): avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.720000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.732929 kernel: audit: type=1300 audit(1734101370.720:973): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f14f42825a8 items=0 ppid=3326 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:30.720000 audit[3453]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f14f42825a8 items=0 ppid=3326 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:30.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431346364376366626138316533393234376162393037373039303536 Dec 13 14:49:30.742372 kernel: audit: type=1327 audit(1734101370.720:973): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431346364376366626138316533393234376162393037373039303536 Dec 13 14:49:30.720000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.749349 kernel: audit: type=1400 audit(1734101370.720:974): avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.720000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.754284 kernel: audit: type=1400 audit(1734101370.720:974): avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.720000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.764787 kernel: audit: type=1400 audit(1734101370.720:974): avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.764870 kernel: audit: type=1400 audit(1734101370.720:974): avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.720000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.769019 kernel: audit: type=1400 audit(1734101370.720:974): avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.720000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.720000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.781404 kernel: audit: type=1400 audit(1734101370.720:974): avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.720000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.788284 kernel: audit: type=1400 audit(1734101370.720:974): avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.720000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.720000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.720000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.720000 audit: BPF prog-id=126 op=LOAD Dec 13 14:49:30.720000 audit[3453]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00025db88 items=0 ppid=3326 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:30.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431346364376366626138316533393234376162393037373039303536 Dec 13 14:49:30.721000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.721000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.721000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.721000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.721000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.721000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.721000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.721000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.721000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.721000 audit: BPF prog-id=127 op=LOAD Dec 13 14:49:30.721000 audit[3453]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00025dbd8 items=0 ppid=3326 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:30.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431346364376366626138316533393234376162393037373039303536 Dec 13 14:49:30.721000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:49:30.721000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:49:30.721000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.721000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.721000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.721000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.721000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.721000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.721000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.721000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.721000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.721000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:30.721000 audit: BPF prog-id=128 op=LOAD Dec 13 14:49:30.721000 audit[3453]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00025dc68 items=0 ppid=3326 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:30.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431346364376366626138316533393234376162393037373039303536 Dec 13 14:49:30.793817 env[1768]: time="2024-12-13T14:49:30.793763957Z" level=info msg="StartContainer for \"414cd7cfba81e39247ab9077090563e981cbee34c6b66ec96f34e2bc14f32238\" returns successfully" Dec 13 14:49:30.813019 systemd[1]: cri-containerd-414cd7cfba81e39247ab9077090563e981cbee34c6b66ec96f34e2bc14f32238.scope: Deactivated successfully. Dec 13 14:49:30.815000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:49:30.935198 env[1768]: time="2024-12-13T14:49:30.935144993Z" level=info msg="shim disconnected" id=414cd7cfba81e39247ab9077090563e981cbee34c6b66ec96f34e2bc14f32238 Dec 13 14:49:30.935198 env[1768]: time="2024-12-13T14:49:30.935196161Z" level=warning msg="cleaning up after shim disconnected" id=414cd7cfba81e39247ab9077090563e981cbee34c6b66ec96f34e2bc14f32238 namespace=k8s.io Dec 13 14:49:30.935521 env[1768]: time="2024-12-13T14:49:30.935208319Z" level=info msg="cleaning up dead shim" Dec 13 14:49:30.945475 env[1768]: time="2024-12-13T14:49:30.945354061Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:49:30Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3492 runtime=io.containerd.runc.v2\n" Dec 13 14:49:31.321430 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-414cd7cfba81e39247ab9077090563e981cbee34c6b66ec96f34e2bc14f32238-rootfs.mount: Deactivated successfully. Dec 13 14:49:32.497804 kubelet[2628]: E1213 14:49:32.497378 2628 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5dmvf" podUID="4829ad21-050f-4e15-8ac8-fbe8a63d9b6a" Dec 13 14:49:33.352454 env[1768]: time="2024-12-13T14:49:33.352414307Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:33.358666 env[1768]: time="2024-12-13T14:49:33.358622444Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:33.361361 env[1768]: time="2024-12-13T14:49:33.361324413Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:33.364922 env[1768]: time="2024-12-13T14:49:33.364886004Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:33.365661 env[1768]: time="2024-12-13T14:49:33.365626076Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 14:49:33.390942 env[1768]: time="2024-12-13T14:49:33.387810381Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:49:33.408656 env[1768]: time="2024-12-13T14:49:33.408612827Z" level=info msg="CreateContainer within sandbox \"4f612cbe67a734ec19c988f5621be28a5bf5139bb2dd98605d8cbebb452ef48f\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:49:33.480773 env[1768]: time="2024-12-13T14:49:33.480708540Z" level=info msg="CreateContainer within sandbox \"4f612cbe67a734ec19c988f5621be28a5bf5139bb2dd98605d8cbebb452ef48f\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"4a4921fc493d377d7b4d003a79df6f4f040a7e90f0f8b566cdffff1ff31a155c\"" Dec 13 14:49:33.481725 env[1768]: time="2024-12-13T14:49:33.481693668Z" level=info msg="StartContainer for \"4a4921fc493d377d7b4d003a79df6f4f040a7e90f0f8b566cdffff1ff31a155c\"" Dec 13 14:49:33.527254 systemd[1]: Started cri-containerd-4a4921fc493d377d7b4d003a79df6f4f040a7e90f0f8b566cdffff1ff31a155c.scope. Dec 13 14:49:33.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.566000 audit: BPF prog-id=129 op=LOAD Dec 13 14:49:33.567000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.567000 audit[3520]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3360 pid=3520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:33.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461343932316663343933643337376437623464303033613739646636 Dec 13 14:49:33.567000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.567000 audit[3520]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3360 pid=3520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:33.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461343932316663343933643337376437623464303033613739646636 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit: BPF prog-id=130 op=LOAD Dec 13 14:49:33.568000 audit[3520]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000387f70 items=0 ppid=3360 pid=3520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:33.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461343932316663343933643337376437623464303033613739646636 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit: BPF prog-id=131 op=LOAD Dec 13 14:49:33.568000 audit[3520]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000387fb8 items=0 ppid=3360 pid=3520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:33.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461343932316663343933643337376437623464303033613739646636 Dec 13 14:49:33.568000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:49:33.568000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:33.568000 audit: BPF prog-id=132 op=LOAD Dec 13 14:49:33.568000 audit[3520]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e43c8 items=0 ppid=3360 pid=3520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:33.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461343932316663343933643337376437623464303033613739646636 Dec 13 14:49:33.640438 env[1768]: time="2024-12-13T14:49:33.640328626Z" level=info msg="StartContainer for \"4a4921fc493d377d7b4d003a79df6f4f040a7e90f0f8b566cdffff1ff31a155c\" returns successfully" Dec 13 14:49:34.381038 systemd[1]: run-containerd-runc-k8s.io-4a4921fc493d377d7b4d003a79df6f4f040a7e90f0f8b566cdffff1ff31a155c-runc.t8Dr1u.mount: Deactivated successfully. Dec 13 14:49:34.496791 kubelet[2628]: E1213 14:49:34.496718 2628 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5dmvf" podUID="4829ad21-050f-4e15-8ac8-fbe8a63d9b6a" Dec 13 14:49:34.654531 kubelet[2628]: I1213 14:49:34.654420 2628 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:49:36.497709 kubelet[2628]: E1213 14:49:36.497590 2628 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5dmvf" podUID="4829ad21-050f-4e15-8ac8-fbe8a63d9b6a" Dec 13 14:49:38.497558 kubelet[2628]: E1213 14:49:38.497518 2628 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5dmvf" podUID="4829ad21-050f-4e15-8ac8-fbe8a63d9b6a" Dec 13 14:49:39.048980 env[1768]: time="2024-12-13T14:49:39.048935240Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:39.051883 env[1768]: time="2024-12-13T14:49:39.051845516Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:39.055362 env[1768]: time="2024-12-13T14:49:39.055325575Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:39.065150 env[1768]: time="2024-12-13T14:49:39.065102920Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:49:39.065793 env[1768]: time="2024-12-13T14:49:39.065758731Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:39.073692 env[1768]: time="2024-12-13T14:49:39.073648731Z" level=info msg="CreateContainer within sandbox \"25a4f59faf8ecc86e738aa006eb4a66e5b8377cb4d6b0deb68e9fdabc60c3c19\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:49:39.104607 env[1768]: time="2024-12-13T14:49:39.104548589Z" level=info msg="CreateContainer within sandbox \"25a4f59faf8ecc86e738aa006eb4a66e5b8377cb4d6b0deb68e9fdabc60c3c19\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"07cb6b91697a1848b7f8c0779c7ef41d2d8092289fa3e0082b2a1679a6995f3b\"" Dec 13 14:49:39.106879 env[1768]: time="2024-12-13T14:49:39.106843376Z" level=info msg="StartContainer for \"07cb6b91697a1848b7f8c0779c7ef41d2d8092289fa3e0082b2a1679a6995f3b\"" Dec 13 14:49:39.157847 systemd[1]: Started cri-containerd-07cb6b91697a1848b7f8c0779c7ef41d2d8092289fa3e0082b2a1679a6995f3b.scope. Dec 13 14:49:39.183820 kernel: kauditd_printk_skb: 91 callbacks suppressed Dec 13 14:49:39.184054 kernel: audit: type=1400 audit(1734101379.178:998): avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f7468965208 items=0 ppid=3326 pid=3561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:39.191366 kernel: audit: type=1300 audit(1734101379.178:998): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f7468965208 items=0 ppid=3326 pid=3561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:39.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037636236623931363937613138343862376638633037373963376566 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.200350 kernel: audit: type=1327 audit(1734101379.178:998): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037636236623931363937613138343862376638633037373963376566 Dec 13 14:49:39.200431 kernel: audit: type=1400 audit(1734101379.178:999): avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.201324 kernel: audit: type=1400 audit(1734101379.178:999): avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.208558 kernel: audit: type=1400 audit(1734101379.178:999): avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.212441 kernel: audit: type=1400 audit(1734101379.178:999): avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.216390 kernel: audit: type=1400 audit(1734101379.178:999): avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.222000 kernel: audit: type=1400 audit(1734101379.178:999): avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.222396 env[1768]: time="2024-12-13T14:49:39.222355642Z" level=info msg="StartContainer for \"07cb6b91697a1848b7f8c0779c7ef41d2d8092289fa3e0082b2a1679a6995f3b\" returns successfully" Dec 13 14:49:39.226093 kernel: audit: type=1400 audit(1734101379.178:999): avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit: BPF prog-id=133 op=LOAD Dec 13 14:49:39.178000 audit[3561]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000210a58 items=0 ppid=3326 pid=3561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:39.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037636236623931363937613138343862376638633037373963376566 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit: BPF prog-id=134 op=LOAD Dec 13 14:49:39.178000 audit[3561]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000210aa8 items=0 ppid=3326 pid=3561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:39.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037636236623931363937613138343862376638633037373963376566 Dec 13 14:49:39.178000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:49:39.178000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:39.178000 audit: BPF prog-id=135 op=LOAD Dec 13 14:49:39.178000 audit[3561]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000210b38 items=0 ppid=3326 pid=3561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:39.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037636236623931363937613138343862376638633037373963376566 Dec 13 14:49:39.709511 kubelet[2628]: I1213 14:49:39.709116 2628 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-5947f9c6ff-nd22b" podStartSLOduration=7.276199572 podStartE2EDuration="11.709096176s" podCreationTimestamp="2024-12-13 14:49:28 +0000 UTC" firstStartedPulling="2024-12-13 14:49:28.936358172 +0000 UTC m=+15.722816079" lastFinishedPulling="2024-12-13 14:49:33.369254778 +0000 UTC m=+20.155712683" observedRunningTime="2024-12-13 14:49:33.677851409 +0000 UTC m=+20.464309332" watchObservedRunningTime="2024-12-13 14:49:39.709096176 +0000 UTC m=+26.495554096" Dec 13 14:49:40.022416 env[1768]: time="2024-12-13T14:49:40.022296679Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:49:40.025505 systemd[1]: cri-containerd-07cb6b91697a1848b7f8c0779c7ef41d2d8092289fa3e0082b2a1679a6995f3b.scope: Deactivated successfully. Dec 13 14:49:40.030000 audit: BPF prog-id=135 op=UNLOAD Dec 13 14:49:40.057500 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-07cb6b91697a1848b7f8c0779c7ef41d2d8092289fa3e0082b2a1679a6995f3b-rootfs.mount: Deactivated successfully. Dec 13 14:49:40.084381 kubelet[2628]: I1213 14:49:40.084127 2628 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 13 14:49:40.134359 systemd[1]: Created slice kubepods-burstable-podeb090e6c_bfe4_4317_8bac_84d14254dc2a.slice. Dec 13 14:49:40.152899 systemd[1]: Created slice kubepods-burstable-pod5d2c84cb_46ac_42d4_bbcb_b6e69aa931ca.slice. Dec 13 14:49:40.162296 systemd[1]: Created slice kubepods-besteffort-podc3a29363_5614_4c3a_a49a_7a5afb98c592.slice. Dec 13 14:49:40.176779 systemd[1]: Created slice kubepods-besteffort-pod6051e298_e50c_4744_bd52_0b5ad22e6435.slice. Dec 13 14:49:40.186907 systemd[1]: Created slice kubepods-besteffort-pod8fd2a2a6_7426_4b36_a158_0c72069bd492.slice. Dec 13 14:49:40.221284 env[1768]: time="2024-12-13T14:49:40.219597208Z" level=info msg="shim disconnected" id=07cb6b91697a1848b7f8c0779c7ef41d2d8092289fa3e0082b2a1679a6995f3b Dec 13 14:49:40.221284 env[1768]: time="2024-12-13T14:49:40.219650379Z" level=warning msg="cleaning up after shim disconnected" id=07cb6b91697a1848b7f8c0779c7ef41d2d8092289fa3e0082b2a1679a6995f3b namespace=k8s.io Dec 13 14:49:40.221284 env[1768]: time="2024-12-13T14:49:40.219663699Z" level=info msg="cleaning up dead shim" Dec 13 14:49:40.237944 env[1768]: time="2024-12-13T14:49:40.237903834Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:49:40Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3600 runtime=io.containerd.runc.v2\n" Dec 13 14:49:40.306871 kubelet[2628]: I1213 14:49:40.306751 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kxnf7\" (UniqueName: \"kubernetes.io/projected/eb090e6c-bfe4-4317-8bac-84d14254dc2a-kube-api-access-kxnf7\") pod \"coredns-6f6b679f8f-cj7kv\" (UID: \"eb090e6c-bfe4-4317-8bac-84d14254dc2a\") " pod="kube-system/coredns-6f6b679f8f-cj7kv" Dec 13 14:49:40.306871 kubelet[2628]: I1213 14:49:40.306800 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8fd2a2a6-7426-4b36-a158-0c72069bd492-tigera-ca-bundle\") pod \"calico-kube-controllers-8476d774b7-cdj8q\" (UID: \"8fd2a2a6-7426-4b36-a158-0c72069bd492\") " pod="calico-system/calico-kube-controllers-8476d774b7-cdj8q" Dec 13 14:49:40.306871 kubelet[2628]: I1213 14:49:40.306827 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/6051e298-e50c-4744-bd52-0b5ad22e6435-calico-apiserver-certs\") pod \"calico-apiserver-5cbbfffd85-44tds\" (UID: \"6051e298-e50c-4744-bd52-0b5ad22e6435\") " pod="calico-apiserver/calico-apiserver-5cbbfffd85-44tds" Dec 13 14:49:40.306871 kubelet[2628]: I1213 14:49:40.306851 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/5d2c84cb-46ac-42d4-bbcb-b6e69aa931ca-config-volume\") pod \"coredns-6f6b679f8f-6rqpd\" (UID: \"5d2c84cb-46ac-42d4-bbcb-b6e69aa931ca\") " pod="kube-system/coredns-6f6b679f8f-6rqpd" Dec 13 14:49:40.307162 kubelet[2628]: I1213 14:49:40.306875 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qtm7b\" (UniqueName: \"kubernetes.io/projected/5d2c84cb-46ac-42d4-bbcb-b6e69aa931ca-kube-api-access-qtm7b\") pod \"coredns-6f6b679f8f-6rqpd\" (UID: \"5d2c84cb-46ac-42d4-bbcb-b6e69aa931ca\") " pod="kube-system/coredns-6f6b679f8f-6rqpd" Dec 13 14:49:40.307162 kubelet[2628]: I1213 14:49:40.306897 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rtxkc\" (UniqueName: \"kubernetes.io/projected/8fd2a2a6-7426-4b36-a158-0c72069bd492-kube-api-access-rtxkc\") pod \"calico-kube-controllers-8476d774b7-cdj8q\" (UID: \"8fd2a2a6-7426-4b36-a158-0c72069bd492\") " pod="calico-system/calico-kube-controllers-8476d774b7-cdj8q" Dec 13 14:49:40.307162 kubelet[2628]: I1213 14:49:40.306921 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bhwp9\" (UniqueName: \"kubernetes.io/projected/6051e298-e50c-4744-bd52-0b5ad22e6435-kube-api-access-bhwp9\") pod \"calico-apiserver-5cbbfffd85-44tds\" (UID: \"6051e298-e50c-4744-bd52-0b5ad22e6435\") " pod="calico-apiserver/calico-apiserver-5cbbfffd85-44tds" Dec 13 14:49:40.307162 kubelet[2628]: I1213 14:49:40.306942 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/c3a29363-5614-4c3a-a49a-7a5afb98c592-calico-apiserver-certs\") pod \"calico-apiserver-5cbbfffd85-dl4wj\" (UID: \"c3a29363-5614-4c3a-a49a-7a5afb98c592\") " pod="calico-apiserver/calico-apiserver-5cbbfffd85-dl4wj" Dec 13 14:49:40.307162 kubelet[2628]: I1213 14:49:40.306964 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gpfmh\" (UniqueName: \"kubernetes.io/projected/c3a29363-5614-4c3a-a49a-7a5afb98c592-kube-api-access-gpfmh\") pod \"calico-apiserver-5cbbfffd85-dl4wj\" (UID: \"c3a29363-5614-4c3a-a49a-7a5afb98c592\") " pod="calico-apiserver/calico-apiserver-5cbbfffd85-dl4wj" Dec 13 14:49:40.307395 kubelet[2628]: I1213 14:49:40.306992 2628 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/eb090e6c-bfe4-4317-8bac-84d14254dc2a-config-volume\") pod \"coredns-6f6b679f8f-cj7kv\" (UID: \"eb090e6c-bfe4-4317-8bac-84d14254dc2a\") " pod="kube-system/coredns-6f6b679f8f-cj7kv" Dec 13 14:49:40.473482 env[1768]: time="2024-12-13T14:49:40.473437849Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cbbfffd85-dl4wj,Uid:c3a29363-5614-4c3a-a49a-7a5afb98c592,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:49:40.485293 env[1768]: time="2024-12-13T14:49:40.485236810Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cbbfffd85-44tds,Uid:6051e298-e50c-4744-bd52-0b5ad22e6435,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:49:40.491536 env[1768]: time="2024-12-13T14:49:40.491482343Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8476d774b7-cdj8q,Uid:8fd2a2a6-7426-4b36-a158-0c72069bd492,Namespace:calico-system,Attempt:0,}" Dec 13 14:49:40.505551 systemd[1]: Created slice kubepods-besteffort-pod4829ad21_050f_4e15_8ac8_fbe8a63d9b6a.slice. Dec 13 14:49:40.511301 env[1768]: time="2024-12-13T14:49:40.511215425Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5dmvf,Uid:4829ad21-050f-4e15-8ac8-fbe8a63d9b6a,Namespace:calico-system,Attempt:0,}" Dec 13 14:49:40.686561 env[1768]: time="2024-12-13T14:49:40.686522315Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:49:40.739156 env[1768]: time="2024-12-13T14:49:40.739110993Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-cj7kv,Uid:eb090e6c-bfe4-4317-8bac-84d14254dc2a,Namespace:kube-system,Attempt:0,}" Dec 13 14:49:40.768040 env[1768]: time="2024-12-13T14:49:40.767983514Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-6rqpd,Uid:5d2c84cb-46ac-42d4-bbcb-b6e69aa931ca,Namespace:kube-system,Attempt:0,}" Dec 13 14:49:40.819463 env[1768]: time="2024-12-13T14:49:40.819375378Z" level=error msg="Failed to destroy network for sandbox \"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.820653 env[1768]: time="2024-12-13T14:49:40.819969229Z" level=error msg="encountered an error cleaning up failed sandbox \"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.820653 env[1768]: time="2024-12-13T14:49:40.820062378Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8476d774b7-cdj8q,Uid:8fd2a2a6-7426-4b36-a158-0c72069bd492,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.844940 kubelet[2628]: E1213 14:49:40.844886 2628 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.845600 kubelet[2628]: E1213 14:49:40.844969 2628 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-8476d774b7-cdj8q" Dec 13 14:49:40.845600 kubelet[2628]: E1213 14:49:40.844995 2628 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-8476d774b7-cdj8q" Dec 13 14:49:40.845600 kubelet[2628]: E1213 14:49:40.845057 2628 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-8476d774b7-cdj8q_calico-system(8fd2a2a6-7426-4b36-a158-0c72069bd492)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-8476d774b7-cdj8q_calico-system(8fd2a2a6-7426-4b36-a158-0c72069bd492)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-8476d774b7-cdj8q" podUID="8fd2a2a6-7426-4b36-a158-0c72069bd492" Dec 13 14:49:40.854173 env[1768]: time="2024-12-13T14:49:40.854066967Z" level=error msg="Failed to destroy network for sandbox \"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.854737 env[1768]: time="2024-12-13T14:49:40.854691288Z" level=error msg="encountered an error cleaning up failed sandbox \"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.854916 env[1768]: time="2024-12-13T14:49:40.854882105Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5dmvf,Uid:4829ad21-050f-4e15-8ac8-fbe8a63d9b6a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.855786 kubelet[2628]: E1213 14:49:40.855254 2628 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.855786 kubelet[2628]: E1213 14:49:40.855358 2628 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5dmvf" Dec 13 14:49:40.855786 kubelet[2628]: E1213 14:49:40.855386 2628 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5dmvf" Dec 13 14:49:40.856220 kubelet[2628]: E1213 14:49:40.855459 2628 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-5dmvf_calico-system(4829ad21-050f-4e15-8ac8-fbe8a63d9b6a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-5dmvf_calico-system(4829ad21-050f-4e15-8ac8-fbe8a63d9b6a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5dmvf" podUID="4829ad21-050f-4e15-8ac8-fbe8a63d9b6a" Dec 13 14:49:40.875222 env[1768]: time="2024-12-13T14:49:40.875149809Z" level=error msg="Failed to destroy network for sandbox \"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.875885 env[1768]: time="2024-12-13T14:49:40.875827944Z" level=error msg="encountered an error cleaning up failed sandbox \"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.876169 env[1768]: time="2024-12-13T14:49:40.876112687Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cbbfffd85-dl4wj,Uid:c3a29363-5614-4c3a-a49a-7a5afb98c592,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.876675 kubelet[2628]: E1213 14:49:40.876625 2628 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.876772 kubelet[2628]: E1213 14:49:40.876693 2628 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5cbbfffd85-dl4wj" Dec 13 14:49:40.876772 kubelet[2628]: E1213 14:49:40.876721 2628 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5cbbfffd85-dl4wj" Dec 13 14:49:40.879100 kubelet[2628]: E1213 14:49:40.876797 2628 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5cbbfffd85-dl4wj_calico-apiserver(c3a29363-5614-4c3a-a49a-7a5afb98c592)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5cbbfffd85-dl4wj_calico-apiserver(c3a29363-5614-4c3a-a49a-7a5afb98c592)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5cbbfffd85-dl4wj" podUID="c3a29363-5614-4c3a-a49a-7a5afb98c592" Dec 13 14:49:40.882980 env[1768]: time="2024-12-13T14:49:40.882864181Z" level=error msg="Failed to destroy network for sandbox \"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.884326 env[1768]: time="2024-12-13T14:49:40.884278064Z" level=error msg="encountered an error cleaning up failed sandbox \"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.884542 env[1768]: time="2024-12-13T14:49:40.884466227Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cbbfffd85-44tds,Uid:6051e298-e50c-4744-bd52-0b5ad22e6435,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.885402 kubelet[2628]: E1213 14:49:40.885019 2628 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.885402 kubelet[2628]: E1213 14:49:40.885155 2628 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5cbbfffd85-44tds" Dec 13 14:49:40.885402 kubelet[2628]: E1213 14:49:40.885198 2628 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5cbbfffd85-44tds" Dec 13 14:49:40.885843 kubelet[2628]: E1213 14:49:40.885325 2628 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5cbbfffd85-44tds_calico-apiserver(6051e298-e50c-4744-bd52-0b5ad22e6435)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5cbbfffd85-44tds_calico-apiserver(6051e298-e50c-4744-bd52-0b5ad22e6435)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5cbbfffd85-44tds" podUID="6051e298-e50c-4744-bd52-0b5ad22e6435" Dec 13 14:49:40.976507 env[1768]: time="2024-12-13T14:49:40.974076276Z" level=error msg="Failed to destroy network for sandbox \"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.976507 env[1768]: time="2024-12-13T14:49:40.974784637Z" level=error msg="encountered an error cleaning up failed sandbox \"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.976507 env[1768]: time="2024-12-13T14:49:40.974852331Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-cj7kv,Uid:eb090e6c-bfe4-4317-8bac-84d14254dc2a,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.976777 kubelet[2628]: E1213 14:49:40.975126 2628 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.976777 kubelet[2628]: E1213 14:49:40.975205 2628 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-cj7kv" Dec 13 14:49:40.976777 kubelet[2628]: E1213 14:49:40.975246 2628 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-cj7kv" Dec 13 14:49:40.976924 kubelet[2628]: E1213 14:49:40.975379 2628 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-cj7kv_kube-system(eb090e6c-bfe4-4317-8bac-84d14254dc2a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-cj7kv_kube-system(eb090e6c-bfe4-4317-8bac-84d14254dc2a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-cj7kv" podUID="eb090e6c-bfe4-4317-8bac-84d14254dc2a" Dec 13 14:49:40.989226 env[1768]: time="2024-12-13T14:49:40.989160329Z" level=error msg="Failed to destroy network for sandbox \"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.989586 env[1768]: time="2024-12-13T14:49:40.989542763Z" level=error msg="encountered an error cleaning up failed sandbox \"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.989769 env[1768]: time="2024-12-13T14:49:40.989606024Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-6rqpd,Uid:5d2c84cb-46ac-42d4-bbcb-b6e69aa931ca,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.990026 kubelet[2628]: E1213 14:49:40.989987 2628 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:40.990131 kubelet[2628]: E1213 14:49:40.990051 2628 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-6rqpd" Dec 13 14:49:40.990131 kubelet[2628]: E1213 14:49:40.990076 2628 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-6rqpd" Dec 13 14:49:40.990218 kubelet[2628]: E1213 14:49:40.990138 2628 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-6rqpd_kube-system(5d2c84cb-46ac-42d4-bbcb-b6e69aa931ca)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-6rqpd_kube-system(5d2c84cb-46ac-42d4-bbcb-b6e69aa931ca)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-6rqpd" podUID="5d2c84cb-46ac-42d4-bbcb-b6e69aa931ca" Dec 13 14:49:41.687556 kubelet[2628]: I1213 14:49:41.687526 2628 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" Dec 13 14:49:41.689055 env[1768]: time="2024-12-13T14:49:41.688994430Z" level=info msg="StopPodSandbox for \"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f\"" Dec 13 14:49:41.689497 kubelet[2628]: I1213 14:49:41.689478 2628 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" Dec 13 14:49:41.690153 env[1768]: time="2024-12-13T14:49:41.690115857Z" level=info msg="StopPodSandbox for \"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e\"" Dec 13 14:49:41.692790 kubelet[2628]: I1213 14:49:41.692770 2628 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" Dec 13 14:49:41.693568 env[1768]: time="2024-12-13T14:49:41.693534665Z" level=info msg="StopPodSandbox for \"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f\"" Dec 13 14:49:41.695295 kubelet[2628]: I1213 14:49:41.695253 2628 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" Dec 13 14:49:41.696137 env[1768]: time="2024-12-13T14:49:41.696069651Z" level=info msg="StopPodSandbox for \"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870\"" Dec 13 14:49:41.697516 kubelet[2628]: I1213 14:49:41.697316 2628 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" Dec 13 14:49:41.704621 env[1768]: time="2024-12-13T14:49:41.704569571Z" level=info msg="StopPodSandbox for \"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437\"" Dec 13 14:49:41.706058 kubelet[2628]: I1213 14:49:41.706030 2628 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" Dec 13 14:49:41.706980 env[1768]: time="2024-12-13T14:49:41.706939710Z" level=info msg="StopPodSandbox for \"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1\"" Dec 13 14:49:41.809079 env[1768]: time="2024-12-13T14:49:41.809005682Z" level=error msg="StopPodSandbox for \"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870\" failed" error="failed to destroy network for sandbox \"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:41.809390 kubelet[2628]: E1213 14:49:41.809307 2628 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" Dec 13 14:49:41.809606 kubelet[2628]: E1213 14:49:41.809435 2628 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870"} Dec 13 14:49:41.810043 kubelet[2628]: E1213 14:49:41.809650 2628 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4829ad21-050f-4e15-8ac8-fbe8a63d9b6a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:49:41.810202 kubelet[2628]: E1213 14:49:41.810058 2628 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4829ad21-050f-4e15-8ac8-fbe8a63d9b6a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5dmvf" podUID="4829ad21-050f-4e15-8ac8-fbe8a63d9b6a" Dec 13 14:49:41.842636 env[1768]: time="2024-12-13T14:49:41.842573187Z" level=error msg="StopPodSandbox for \"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f\" failed" error="failed to destroy network for sandbox \"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:41.843006 kubelet[2628]: E1213 14:49:41.842937 2628 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" Dec 13 14:49:41.844356 kubelet[2628]: E1213 14:49:41.843039 2628 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f"} Dec 13 14:49:41.844356 kubelet[2628]: E1213 14:49:41.843088 2628 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8fd2a2a6-7426-4b36-a158-0c72069bd492\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:49:41.844356 kubelet[2628]: E1213 14:49:41.843136 2628 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8fd2a2a6-7426-4b36-a158-0c72069bd492\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-8476d774b7-cdj8q" podUID="8fd2a2a6-7426-4b36-a158-0c72069bd492" Dec 13 14:49:41.856639 env[1768]: time="2024-12-13T14:49:41.856568168Z" level=error msg="StopPodSandbox for \"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e\" failed" error="failed to destroy network for sandbox \"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:41.857247 kubelet[2628]: E1213 14:49:41.857194 2628 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" Dec 13 14:49:41.858715 kubelet[2628]: E1213 14:49:41.858354 2628 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e"} Dec 13 14:49:41.858715 kubelet[2628]: E1213 14:49:41.858432 2628 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"eb090e6c-bfe4-4317-8bac-84d14254dc2a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:49:41.858715 kubelet[2628]: E1213 14:49:41.858471 2628 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"eb090e6c-bfe4-4317-8bac-84d14254dc2a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-cj7kv" podUID="eb090e6c-bfe4-4317-8bac-84d14254dc2a" Dec 13 14:49:41.880851 env[1768]: time="2024-12-13T14:49:41.880786660Z" level=error msg="StopPodSandbox for \"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f\" failed" error="failed to destroy network for sandbox \"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:41.882506 kubelet[2628]: E1213 14:49:41.882326 2628 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" Dec 13 14:49:41.882506 kubelet[2628]: E1213 14:49:41.882396 2628 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f"} Dec 13 14:49:41.882506 kubelet[2628]: E1213 14:49:41.882440 2628 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c3a29363-5614-4c3a-a49a-7a5afb98c592\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:49:41.882506 kubelet[2628]: E1213 14:49:41.882471 2628 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c3a29363-5614-4c3a-a49a-7a5afb98c592\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5cbbfffd85-dl4wj" podUID="c3a29363-5614-4c3a-a49a-7a5afb98c592" Dec 13 14:49:41.901524 env[1768]: time="2024-12-13T14:49:41.901457857Z" level=error msg="StopPodSandbox for \"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437\" failed" error="failed to destroy network for sandbox \"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:41.903445 kubelet[2628]: E1213 14:49:41.903121 2628 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" Dec 13 14:49:41.903664 kubelet[2628]: E1213 14:49:41.903518 2628 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437"} Dec 13 14:49:41.903664 kubelet[2628]: E1213 14:49:41.903624 2628 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6051e298-e50c-4744-bd52-0b5ad22e6435\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:49:41.903810 kubelet[2628]: E1213 14:49:41.903659 2628 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6051e298-e50c-4744-bd52-0b5ad22e6435\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5cbbfffd85-44tds" podUID="6051e298-e50c-4744-bd52-0b5ad22e6435" Dec 13 14:49:41.910547 env[1768]: time="2024-12-13T14:49:41.910484321Z" level=error msg="StopPodSandbox for \"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1\" failed" error="failed to destroy network for sandbox \"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:49:41.911042 kubelet[2628]: E1213 14:49:41.910988 2628 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" Dec 13 14:49:41.911215 kubelet[2628]: E1213 14:49:41.911056 2628 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1"} Dec 13 14:49:41.911215 kubelet[2628]: E1213 14:49:41.911096 2628 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5d2c84cb-46ac-42d4-bbcb-b6e69aa931ca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:49:41.911215 kubelet[2628]: E1213 14:49:41.911128 2628 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5d2c84cb-46ac-42d4-bbcb-b6e69aa931ca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-6rqpd" podUID="5d2c84cb-46ac-42d4-bbcb-b6e69aa931ca" Dec 13 14:49:49.167085 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount773922540.mount: Deactivated successfully. Dec 13 14:49:49.232237 env[1768]: time="2024-12-13T14:49:49.232184860Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:49.235151 env[1768]: time="2024-12-13T14:49:49.235109173Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:49.237290 env[1768]: time="2024-12-13T14:49:49.237247255Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:49.239621 env[1768]: time="2024-12-13T14:49:49.239588177Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:49.240565 env[1768]: time="2024-12-13T14:49:49.240024370Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:49:49.290781 env[1768]: time="2024-12-13T14:49:49.290734564Z" level=info msg="CreateContainer within sandbox \"25a4f59faf8ecc86e738aa006eb4a66e5b8377cb4d6b0deb68e9fdabc60c3c19\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:49:49.317740 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1333233371.mount: Deactivated successfully. Dec 13 14:49:49.321199 env[1768]: time="2024-12-13T14:49:49.321152542Z" level=info msg="CreateContainer within sandbox \"25a4f59faf8ecc86e738aa006eb4a66e5b8377cb4d6b0deb68e9fdabc60c3c19\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"94db4d3ba450f57d79f668c14fc186d8b37c8b48aa2064ae80f86fe82b3454ae\"" Dec 13 14:49:49.323204 env[1768]: time="2024-12-13T14:49:49.323168507Z" level=info msg="StartContainer for \"94db4d3ba450f57d79f668c14fc186d8b37c8b48aa2064ae80f86fe82b3454ae\"" Dec 13 14:49:49.346533 systemd[1]: Started cri-containerd-94db4d3ba450f57d79f668c14fc186d8b37c8b48aa2064ae80f86fe82b3454ae.scope. Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.385577 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:49:49.385672 kernel: audit: type=1400 audit(1734101389.382:1005): avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.392372 kernel: audit: type=1300 audit(1734101389.382:1005): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7f8e8d1c1988 items=0 ppid=3326 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:49.382000 audit[3945]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7f8e8d1c1988 items=0 ppid=3326 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:49.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934646234643362613435306635376437396636363863313466633138 Dec 13 14:49:49.399286 kernel: audit: type=1327 audit(1734101389.382:1005): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934646234643362613435306635376437396636363863313466633138 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.403384 kernel: audit: type=1400 audit(1734101389.382:1006): avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.407285 kernel: audit: type=1400 audit(1734101389.382:1006): avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.414183 kernel: audit: type=1400 audit(1734101389.382:1006): avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.414287 kernel: audit: type=1400 audit(1734101389.382:1006): avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.419964 kernel: audit: type=1400 audit(1734101389.382:1006): avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.426866 kernel: audit: type=1400 audit(1734101389.382:1006): avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.426950 kernel: audit: type=1400 audit(1734101389.382:1006): avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit: BPF prog-id=136 op=LOAD Dec 13 14:49:49.382000 audit[3945]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c0000dbc08 items=0 ppid=3326 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:49.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934646234643362613435306635376437396636363863313466633138 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit: BPF prog-id=137 op=LOAD Dec 13 14:49:49.382000 audit[3945]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c0000dbc58 items=0 ppid=3326 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:49.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934646234643362613435306635376437396636363863313466633138 Dec 13 14:49:49.382000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:49:49.382000 audit: BPF prog-id=136 op=UNLOAD Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:49.382000 audit: BPF prog-id=138 op=LOAD Dec 13 14:49:49.382000 audit[3945]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c0000dbce8 items=0 ppid=3326 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:49.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934646234643362613435306635376437396636363863313466633138 Dec 13 14:49:49.434933 env[1768]: time="2024-12-13T14:49:49.434453576Z" level=info msg="StartContainer for \"94db4d3ba450f57d79f668c14fc186d8b37c8b48aa2064ae80f86fe82b3454ae\" returns successfully" Dec 13 14:49:50.044708 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:49:50.045127 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:49:50.751471 kubelet[2628]: I1213 14:49:50.751440 2628 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:49:50.801588 systemd[1]: run-containerd-runc-k8s.io-94db4d3ba450f57d79f668c14fc186d8b37c8b48aa2064ae80f86fe82b3454ae-runc.O1wrMl.mount: Deactivated successfully. Dec 13 14:49:50.837967 kubelet[2628]: I1213 14:49:50.834271 2628 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-56rk2" podStartSLOduration=2.382632658 podStartE2EDuration="22.829835821s" podCreationTimestamp="2024-12-13 14:49:28 +0000 UTC" firstStartedPulling="2024-12-13 14:49:28.794247111 +0000 UTC m=+15.580705023" lastFinishedPulling="2024-12-13 14:49:49.241450273 +0000 UTC m=+36.027908186" observedRunningTime="2024-12-13 14:49:49.851373597 +0000 UTC m=+36.637831521" watchObservedRunningTime="2024-12-13 14:49:50.829835821 +0000 UTC m=+37.616293746" Dec 13 14:49:50.918000 audit[4051]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=4051 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:49:50.918000 audit[4051]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc368fbf10 a2=0 a3=7ffc368fbefc items=0 ppid=3063 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:50.918000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:50.925000 audit[4051]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=4051 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:49:50.925000 audit[4051]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc368fbf10 a2=0 a3=7ffc368fbefc items=0 ppid=3063 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:50.925000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:51.556000 audit[4096]: AVC avc: denied { write } for pid=4096 comm="tee" name="fd" dev="proc" ino=26084 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:49:51.556000 audit[4096]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf86daa0a a2=241 a3=1b6 items=1 ppid=4070 pid=4096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:51.556000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:49:51.556000 audit: PATH item=0 name="/dev/fd/63" inode=24934 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:51.556000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:49:51.567000 audit[4115]: AVC avc: denied { write } for pid=4115 comm="tee" name="fd" dev="proc" ino=26093 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:49:51.567000 audit[4115]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe92dd6a1a a2=241 a3=1b6 items=1 ppid=4067 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:51.567000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:49:51.567000 audit: PATH item=0 name="/dev/fd/63" inode=26078 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:51.569000 audit[4106]: AVC avc: denied { write } for pid=4106 comm="tee" name="fd" dev="proc" ino=26097 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:49:51.569000 audit[4106]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd8e7f1a1a a2=241 a3=1b6 items=1 ppid=4066 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:51.569000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:49:51.569000 audit: PATH item=0 name="/dev/fd/63" inode=26068 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:51.569000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:49:51.587000 audit[4125]: AVC avc: denied { write } for pid=4125 comm="tee" name="fd" dev="proc" ino=26104 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:49:51.592000 audit[4108]: AVC avc: denied { write } for pid=4108 comm="tee" name="fd" dev="proc" ino=26106 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:49:51.567000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:49:51.587000 audit[4125]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc3b2b9a1b a2=241 a3=1b6 items=1 ppid=4076 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:51.587000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:49:51.587000 audit: PATH item=0 name="/dev/fd/63" inode=26086 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:51.587000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:49:51.616000 audit[4131]: AVC avc: denied { write } for pid=4131 comm="tee" name="fd" dev="proc" ino=24941 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:49:51.592000 audit[4108]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd11531a0b a2=241 a3=1b6 items=1 ppid=4064 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:51.592000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:49:51.592000 audit: PATH item=0 name="/dev/fd/63" inode=26075 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:51.592000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:49:51.616000 audit[4131]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe2e9dba1a a2=241 a3=1b6 items=1 ppid=4060 pid=4131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:51.616000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:49:51.616000 audit: PATH item=0 name="/dev/fd/63" inode=26101 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:51.616000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:49:51.645000 audit[4138]: AVC avc: denied { write } for pid=4138 comm="tee" name="fd" dev="proc" ino=24948 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:49:51.645000 audit[4138]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0f39fa1c a2=241 a3=1b6 items=1 ppid=4079 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:51.645000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:49:51.645000 audit: PATH item=0 name="/dev/fd/63" inode=24945 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:49:51.645000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:49:51.960000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.960000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.960000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.960000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.960000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.960000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.960000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.960000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.960000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.960000 audit: BPF prog-id=139 op=LOAD Dec 13 14:49:51.960000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd4f2a3f00 a2=98 a3=3 items=0 ppid=4062 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:51.960000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:49:51.960000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:49:51.962000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.962000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.962000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.962000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.962000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.962000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.962000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.962000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.962000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.962000 audit: BPF prog-id=140 op=LOAD Dec 13 14:49:51.962000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd4f2a3ce0 a2=74 a3=540051 items=0 ppid=4062 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:51.962000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:49:51.962000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:49:51.962000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.962000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.962000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.962000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.962000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.962000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.962000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.962000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.962000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:51.962000 audit: BPF prog-id=141 op=LOAD Dec 13 14:49:51.962000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd4f2a3d10 a2=94 a3=2 items=0 ppid=4062 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:51.962000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:49:51.962000 audit: BPF prog-id=141 op=UNLOAD Dec 13 14:49:52.070000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.070000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.070000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.070000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.070000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.070000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.070000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.070000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.070000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.070000 audit: BPF prog-id=142 op=LOAD Dec 13 14:49:52.070000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd4f2a3bd0 a2=40 a3=1 items=0 ppid=4062 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.070000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:49:52.070000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:49:52.070000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.070000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd4f2a3ca0 a2=50 a3=7ffd4f2a3d80 items=0 ppid=4062 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.070000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:49:52.080000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.080000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4f2a3be0 a2=28 a3=0 items=0 ppid=4062 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:49:52.080000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.080000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd4f2a3c10 a2=28 a3=0 items=0 ppid=4062 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:49:52.080000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.080000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd4f2a3b20 a2=28 a3=0 items=0 ppid=4062 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:49:52.080000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.080000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4f2a3c30 a2=28 a3=0 items=0 ppid=4062 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:49:52.080000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.080000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4f2a3c10 a2=28 a3=0 items=0 ppid=4062 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:49:52.080000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.080000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4f2a3c00 a2=28 a3=0 items=0 ppid=4062 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:49:52.080000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.080000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4f2a3c30 a2=28 a3=0 items=0 ppid=4062 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:49:52.080000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.080000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd4f2a3c10 a2=28 a3=0 items=0 ppid=4062 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:49:52.080000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.080000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd4f2a3c30 a2=28 a3=0 items=0 ppid=4062 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:49:52.080000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.080000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd4f2a3c00 a2=28 a3=0 items=0 ppid=4062 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:49:52.080000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.080000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4f2a3c70 a2=28 a3=0 items=0 ppid=4062 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:49:52.080000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.080000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd4f2a3a20 a2=50 a3=1 items=0 ppid=4062 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:49:52.080000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.080000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.080000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.080000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.080000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.080000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.080000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.080000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.080000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.080000 audit: BPF prog-id=143 op=LOAD Dec 13 14:49:52.080000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd4f2a3a20 a2=94 a3=5 items=0 ppid=4062 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:49:52.081000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd4f2a3ad0 a2=50 a3=1 items=0 ppid=4062 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.081000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd4f2a3bf0 a2=4 a3=38 items=0 ppid=4062 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.081000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { confidentiality } for pid=4170 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:49:52.081000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd4f2a3c40 a2=94 a3=6 items=0 ppid=4062 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.081000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { confidentiality } for pid=4170 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:49:52.081000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd4f2a33f0 a2=94 a3=83 items=0 ppid=4062 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.081000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.081000 audit[4170]: AVC avc: denied { confidentiality } for pid=4170 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:49:52.081000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd4f2a33f0 a2=94 a3=83 items=0 ppid=4062 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.081000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit: BPF prog-id=144 op=LOAD Dec 13 14:49:52.095000 audit[4173]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffffb40ac10 a2=98 a3=1999999999999999 items=0 ppid=4062 pid=4173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.095000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:49:52.095000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit: BPF prog-id=145 op=LOAD Dec 13 14:49:52.095000 audit[4173]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffffb40aaf0 a2=74 a3=ffff items=0 ppid=4062 pid=4173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.095000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:49:52.095000 audit: BPF prog-id=145 op=UNLOAD Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { perfmon } for pid=4173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit[4173]: AVC avc: denied { bpf } for pid=4173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.095000 audit: BPF prog-id=146 op=LOAD Dec 13 14:49:52.095000 audit[4173]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffffb40ab30 a2=40 a3=7ffffb40ad10 items=0 ppid=4062 pid=4173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.095000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:49:52.095000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:49:52.168996 systemd-networkd[1461]: vxlan.calico: Link UP Dec 13 14:49:52.169006 systemd-networkd[1461]: vxlan.calico: Gained carrier Dec 13 14:49:52.170131 (udev-worker)[4002]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:49:52.245000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.245000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.245000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.245000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.245000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.245000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.245000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.245000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.245000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.245000 audit: BPF prog-id=147 op=LOAD Dec 13 14:49:52.245000 audit[4202]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcc5039e90 a2=98 a3=ffffffff items=0 ppid=4062 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.245000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:49:52.245000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit: BPF prog-id=148 op=LOAD Dec 13 14:49:52.252000 audit[4202]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcc5039ca0 a2=74 a3=540051 items=0 ppid=4062 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.252000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:49:52.252000 audit: BPF prog-id=148 op=UNLOAD Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit: BPF prog-id=149 op=LOAD Dec 13 14:49:52.252000 audit[4202]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcc5039cd0 a2=94 a3=2 items=0 ppid=4062 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.252000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:49:52.252000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcc5039ba0 a2=28 a3=0 items=0 ppid=4062 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.252000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc5039bd0 a2=28 a3=0 items=0 ppid=4062 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.252000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc5039ae0 a2=28 a3=0 items=0 ppid=4062 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.252000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcc5039bf0 a2=28 a3=0 items=0 ppid=4062 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.252000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcc5039bd0 a2=28 a3=0 items=0 ppid=4062 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.252000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcc5039bc0 a2=28 a3=0 items=0 ppid=4062 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.252000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcc5039bf0 a2=28 a3=0 items=0 ppid=4062 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.252000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc5039bd0 a2=28 a3=0 items=0 ppid=4062 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.252000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc5039bf0 a2=28 a3=0 items=0 ppid=4062 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.252000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:49:52.252000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.252000 audit[4202]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc5039bc0 a2=28 a3=0 items=0 ppid=4062 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.252000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:49:52.253000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.253000 audit[4202]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcc5039c30 a2=28 a3=0 items=0 ppid=4062 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.253000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:49:52.253000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.253000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.253000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.253000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.253000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.253000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.253000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.253000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.253000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.253000 audit: BPF prog-id=150 op=LOAD Dec 13 14:49:52.253000 audit[4202]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcc5039aa0 a2=40 a3=0 items=0 ppid=4062 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.253000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:49:52.253000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:49:52.254000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.254000 audit[4202]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffcc5039a90 a2=50 a3=2800 items=0 ppid=4062 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.254000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:49:52.254000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.254000 audit[4202]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffcc5039a90 a2=50 a3=2800 items=0 ppid=4062 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.254000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:49:52.254000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.254000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.254000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.254000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.254000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.254000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.254000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.254000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.254000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.254000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.254000 audit: BPF prog-id=151 op=LOAD Dec 13 14:49:52.254000 audit[4202]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcc50392b0 a2=94 a3=2 items=0 ppid=4062 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.254000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:49:52.254000 audit: BPF prog-id=151 op=UNLOAD Dec 13 14:49:52.254000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.254000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.254000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.254000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.254000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.254000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.254000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.254000 audit[4202]: AVC avc: denied { perfmon } for pid=4202 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.254000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.254000 audit[4202]: AVC avc: denied { bpf } for pid=4202 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.254000 audit: BPF prog-id=152 op=LOAD Dec 13 14:49:52.254000 audit[4202]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcc50393b0 a2=94 a3=2d items=0 ppid=4062 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.254000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit: BPF prog-id=153 op=LOAD Dec 13 14:49:52.258000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc3bb83460 a2=98 a3=0 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.258000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.258000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit: BPF prog-id=154 op=LOAD Dec 13 14:49:52.258000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc3bb83240 a2=74 a3=540051 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.258000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.258000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.258000 audit: BPF prog-id=155 op=LOAD Dec 13 14:49:52.258000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc3bb83270 a2=94 a3=2 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.258000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.259000 audit: BPF prog-id=155 op=UNLOAD Dec 13 14:49:52.262195 (udev-worker)[4201]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:49:52.265608 (udev-worker)[4200]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:49:52.385000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.385000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.385000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.385000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.385000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.385000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.385000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.385000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.385000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.385000 audit: BPF prog-id=156 op=LOAD Dec 13 14:49:52.385000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc3bb83130 a2=40 a3=1 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.385000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.385000 audit: BPF prog-id=156 op=UNLOAD Dec 13 14:49:52.385000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.385000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc3bb83200 a2=50 a3=7ffc3bb832e0 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.385000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.395000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.395000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3bb83140 a2=28 a3=0 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.395000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3bb83170 a2=28 a3=0 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.396000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3bb83080 a2=28 a3=0 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.396000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3bb83190 a2=28 a3=0 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.396000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3bb83170 a2=28 a3=0 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.396000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3bb83160 a2=28 a3=0 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.396000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3bb83190 a2=28 a3=0 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.396000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3bb83170 a2=28 a3=0 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.396000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3bb83190 a2=28 a3=0 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.396000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3bb83160 a2=28 a3=0 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.396000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3bb831d0 a2=28 a3=0 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.396000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc3bb82f80 a2=50 a3=1 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.396000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit: BPF prog-id=157 op=LOAD Dec 13 14:49:52.396000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc3bb82f80 a2=94 a3=5 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.396000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.396000 audit: BPF prog-id=157 op=UNLOAD Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc3bb83030 a2=50 a3=1 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.396000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc3bb83150 a2=4 a3=38 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.396000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.396000 audit[4204]: AVC avc: denied { confidentiality } for pid=4204 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:49:52.396000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc3bb831a0 a2=94 a3=6 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.396000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.397000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.397000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.397000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.397000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.397000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.397000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.397000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.397000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.397000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.397000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.397000 audit[4204]: AVC avc: denied { confidentiality } for pid=4204 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:49:52.397000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc3bb82950 a2=94 a3=83 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.397000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.397000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.397000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.397000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.397000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.397000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.397000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.397000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.397000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.397000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.397000 audit[4204]: AVC avc: denied { confidentiality } for pid=4204 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:49:52.397000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc3bb82950 a2=94 a3=83 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.397000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.397000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc3bb84390 a2=10 a3=f1f00800 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.398000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.398000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc3bb84230 a2=10 a3=3 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.398000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.398000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.398000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc3bb841d0 a2=10 a3=3 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.398000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.398000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:52.398000 audit[4204]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc3bb841d0 a2=10 a3=7 items=0 ppid=4062 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.398000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:49:52.405000 audit: BPF prog-id=152 op=UNLOAD Dec 13 14:49:52.491000 audit[4229]: NETFILTER_CFG table=nat:97 family=2 entries=15 op=nft_register_chain pid=4229 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:49:52.491000 audit[4229]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd1146fb20 a2=0 a3=7ffd1146fb0c items=0 ppid=4062 pid=4229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.491000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:49:52.494000 audit[4230]: NETFILTER_CFG table=mangle:98 family=2 entries=16 op=nft_register_chain pid=4230 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:49:52.494000 audit[4230]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffce83ec3e0 a2=0 a3=7ffce83ec3cc items=0 ppid=4062 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.494000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:49:52.498000 audit[4231]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=4231 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:49:52.503000 audit[4228]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=4228 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:49:52.503000 audit[4228]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffecc2a2770 a2=0 a3=7ffecc2a275c items=0 ppid=4062 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.503000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:49:52.498000 audit[4231]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc56117d30 a2=0 a3=7ffc56117d1c items=0 ppid=4062 pid=4231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:52.498000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:49:53.274776 systemd-networkd[1461]: vxlan.calico: Gained IPv6LL Dec 13 14:49:53.500570 env[1768]: time="2024-12-13T14:49:53.499623738Z" level=info msg="StopPodSandbox for \"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e\"" Dec 13 14:49:53.983482 env[1768]: 2024-12-13 14:49:53.625 [INFO][4254] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" Dec 13 14:49:53.983482 env[1768]: 2024-12-13 14:49:53.627 [INFO][4254] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" iface="eth0" netns="/var/run/netns/cni-42746752-c3d6-0c40-a9f9-b7f3de3b4d40" Dec 13 14:49:53.983482 env[1768]: 2024-12-13 14:49:53.627 [INFO][4254] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" iface="eth0" netns="/var/run/netns/cni-42746752-c3d6-0c40-a9f9-b7f3de3b4d40" Dec 13 14:49:53.983482 env[1768]: 2024-12-13 14:49:53.629 [INFO][4254] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" iface="eth0" netns="/var/run/netns/cni-42746752-c3d6-0c40-a9f9-b7f3de3b4d40" Dec 13 14:49:53.983482 env[1768]: 2024-12-13 14:49:53.629 [INFO][4254] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" Dec 13 14:49:53.983482 env[1768]: 2024-12-13 14:49:53.629 [INFO][4254] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" Dec 13 14:49:53.983482 env[1768]: 2024-12-13 14:49:53.953 [INFO][4262] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" HandleID="k8s-pod-network.0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0" Dec 13 14:49:53.983482 env[1768]: 2024-12-13 14:49:53.957 [INFO][4262] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:49:53.983482 env[1768]: 2024-12-13 14:49:53.957 [INFO][4262] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:49:53.983482 env[1768]: 2024-12-13 14:49:53.977 [WARNING][4262] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" HandleID="k8s-pod-network.0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0" Dec 13 14:49:53.983482 env[1768]: 2024-12-13 14:49:53.977 [INFO][4262] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" HandleID="k8s-pod-network.0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0" Dec 13 14:49:53.983482 env[1768]: 2024-12-13 14:49:53.979 [INFO][4262] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:49:53.983482 env[1768]: 2024-12-13 14:49:53.981 [INFO][4254] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" Dec 13 14:49:53.986934 systemd[1]: run-netns-cni\x2d42746752\x2dc3d6\x2d0c40\x2da9f9\x2db7f3de3b4d40.mount: Deactivated successfully. Dec 13 14:49:53.988924 env[1768]: time="2024-12-13T14:49:53.988876936Z" level=info msg="TearDown network for sandbox \"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e\" successfully" Dec 13 14:49:53.989019 env[1768]: time="2024-12-13T14:49:53.988922219Z" level=info msg="StopPodSandbox for \"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e\" returns successfully" Dec 13 14:49:53.996606 env[1768]: time="2024-12-13T14:49:53.996548071Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-cj7kv,Uid:eb090e6c-bfe4-4317-8bac-84d14254dc2a,Namespace:kube-system,Attempt:1,}" Dec 13 14:49:54.186481 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib3f765f085b: link becomes ready Dec 13 14:49:54.186502 systemd-networkd[1461]: calib3f765f085b: Link UP Dec 13 14:49:54.188245 systemd-networkd[1461]: calib3f765f085b: Gained carrier Dec 13 14:49:54.191609 (udev-worker)[4207]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:49:54.219685 env[1768]: 2024-12-13 14:49:54.067 [INFO][4268] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0 coredns-6f6b679f8f- kube-system eb090e6c-bfe4-4317-8bac-84d14254dc2a 744 0 2024-12-13 14:49:18 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-25-13 coredns-6f6b679f8f-cj7kv eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib3f765f085b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214" Namespace="kube-system" Pod="coredns-6f6b679f8f-cj7kv" WorkloadEndpoint="ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-" Dec 13 14:49:54.219685 env[1768]: 2024-12-13 14:49:54.067 [INFO][4268] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214" Namespace="kube-system" Pod="coredns-6f6b679f8f-cj7kv" WorkloadEndpoint="ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0" Dec 13 14:49:54.219685 env[1768]: 2024-12-13 14:49:54.116 [INFO][4280] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214" HandleID="k8s-pod-network.1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0" Dec 13 14:49:54.219685 env[1768]: 2024-12-13 14:49:54.132 [INFO][4280] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214" HandleID="k8s-pod-network.1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031a960), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-25-13", "pod":"coredns-6f6b679f8f-cj7kv", "timestamp":"2024-12-13 14:49:54.116694015 +0000 UTC"}, Hostname:"ip-172-31-25-13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:49:54.219685 env[1768]: 2024-12-13 14:49:54.132 [INFO][4280] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:49:54.219685 env[1768]: 2024-12-13 14:49:54.132 [INFO][4280] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:49:54.219685 env[1768]: 2024-12-13 14:49:54.132 [INFO][4280] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-25-13' Dec 13 14:49:54.219685 env[1768]: 2024-12-13 14:49:54.135 [INFO][4280] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214" host="ip-172-31-25-13" Dec 13 14:49:54.219685 env[1768]: 2024-12-13 14:49:54.145 [INFO][4280] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-25-13" Dec 13 14:49:54.219685 env[1768]: 2024-12-13 14:49:54.153 [INFO][4280] ipam/ipam.go 489: Trying affinity for 192.168.73.0/26 host="ip-172-31-25-13" Dec 13 14:49:54.219685 env[1768]: 2024-12-13 14:49:54.155 [INFO][4280] ipam/ipam.go 155: Attempting to load block cidr=192.168.73.0/26 host="ip-172-31-25-13" Dec 13 14:49:54.219685 env[1768]: 2024-12-13 14:49:54.158 [INFO][4280] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.73.0/26 host="ip-172-31-25-13" Dec 13 14:49:54.219685 env[1768]: 2024-12-13 14:49:54.158 [INFO][4280] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.73.0/26 handle="k8s-pod-network.1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214" host="ip-172-31-25-13" Dec 13 14:49:54.219685 env[1768]: 2024-12-13 14:49:54.160 [INFO][4280] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214 Dec 13 14:49:54.219685 env[1768]: 2024-12-13 14:49:54.165 [INFO][4280] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.73.0/26 handle="k8s-pod-network.1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214" host="ip-172-31-25-13" Dec 13 14:49:54.219685 env[1768]: 2024-12-13 14:49:54.177 [INFO][4280] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.73.1/26] block=192.168.73.0/26 handle="k8s-pod-network.1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214" host="ip-172-31-25-13" Dec 13 14:49:54.219685 env[1768]: 2024-12-13 14:49:54.177 [INFO][4280] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.73.1/26] handle="k8s-pod-network.1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214" host="ip-172-31-25-13" Dec 13 14:49:54.219685 env[1768]: 2024-12-13 14:49:54.177 [INFO][4280] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:49:54.219685 env[1768]: 2024-12-13 14:49:54.177 [INFO][4280] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.73.1/26] IPv6=[] ContainerID="1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214" HandleID="k8s-pod-network.1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0" Dec 13 14:49:54.221197 env[1768]: 2024-12-13 14:49:54.181 [INFO][4268] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214" Namespace="kube-system" Pod="coredns-6f6b679f8f-cj7kv" WorkloadEndpoint="ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"eb090e6c-bfe4-4317-8bac-84d14254dc2a", ResourceVersion:"744", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"", Pod:"coredns-6f6b679f8f-cj7kv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.73.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib3f765f085b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:49:54.221197 env[1768]: 2024-12-13 14:49:54.181 [INFO][4268] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.73.1/32] ContainerID="1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214" Namespace="kube-system" Pod="coredns-6f6b679f8f-cj7kv" WorkloadEndpoint="ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0" Dec 13 14:49:54.221197 env[1768]: 2024-12-13 14:49:54.181 [INFO][4268] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib3f765f085b ContainerID="1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214" Namespace="kube-system" Pod="coredns-6f6b679f8f-cj7kv" WorkloadEndpoint="ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0" Dec 13 14:49:54.221197 env[1768]: 2024-12-13 14:49:54.188 [INFO][4268] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214" Namespace="kube-system" Pod="coredns-6f6b679f8f-cj7kv" WorkloadEndpoint="ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0" Dec 13 14:49:54.221197 env[1768]: 2024-12-13 14:49:54.194 [INFO][4268] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214" Namespace="kube-system" Pod="coredns-6f6b679f8f-cj7kv" WorkloadEndpoint="ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"eb090e6c-bfe4-4317-8bac-84d14254dc2a", ResourceVersion:"744", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214", Pod:"coredns-6f6b679f8f-cj7kv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.73.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib3f765f085b", MAC:"02:55:34:4f:b6:8b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:49:54.221197 env[1768]: 2024-12-13 14:49:54.213 [INFO][4268] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214" Namespace="kube-system" Pod="coredns-6f6b679f8f-cj7kv" WorkloadEndpoint="ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0" Dec 13 14:49:54.245149 env[1768]: time="2024-12-13T14:49:54.242914077Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:49:54.245456 env[1768]: time="2024-12-13T14:49:54.245367247Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:49:54.245456 env[1768]: time="2024-12-13T14:49:54.245426134Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:49:54.246285 env[1768]: time="2024-12-13T14:49:54.246202151Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214 pid=4306 runtime=io.containerd.runc.v2 Dec 13 14:49:54.281648 systemd[1]: Started cri-containerd-1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214.scope. Dec 13 14:49:54.291000 audit[4325]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=4325 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:49:54.291000 audit[4325]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffc0b844c60 a2=0 a3=7ffc0b844c4c items=0 ppid=4062 pid=4325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:54.291000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:49:54.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.303000 audit: BPF prog-id=158 op=LOAD Dec 13 14:49:54.303000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.303000 audit[4317]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4306 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:54.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161366438653438333763326165366237376434366563666264316335 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4306 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:54.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161366438653438333763326165366237376434366563666264316335 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit: BPF prog-id=159 op=LOAD Dec 13 14:49:54.304000 audit[4317]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028f930 items=0 ppid=4306 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:54.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161366438653438333763326165366237376434366563666264316335 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit: BPF prog-id=160 op=LOAD Dec 13 14:49:54.304000 audit[4317]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028f978 items=0 ppid=4306 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:54.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161366438653438333763326165366237376434366563666264316335 Dec 13 14:49:54.304000 audit: BPF prog-id=160 op=UNLOAD Dec 13 14:49:54.304000 audit: BPF prog-id=159 op=UNLOAD Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.304000 audit: BPF prog-id=161 op=LOAD Dec 13 14:49:54.304000 audit[4317]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028fd88 items=0 ppid=4306 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:54.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161366438653438333763326165366237376434366563666264316335 Dec 13 14:49:54.345446 env[1768]: time="2024-12-13T14:49:54.345396512Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-cj7kv,Uid:eb090e6c-bfe4-4317-8bac-84d14254dc2a,Namespace:kube-system,Attempt:1,} returns sandbox id \"1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214\"" Dec 13 14:49:54.352226 env[1768]: time="2024-12-13T14:49:54.351995568Z" level=info msg="CreateContainer within sandbox \"1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:49:54.382538 env[1768]: time="2024-12-13T14:49:54.382486100Z" level=info msg="CreateContainer within sandbox \"1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"801a7cb9724bb624185bf15918de3aa5774d021123d7ae9596afcf0304f2d7e2\"" Dec 13 14:49:54.383703 env[1768]: time="2024-12-13T14:49:54.383674183Z" level=info msg="StartContainer for \"801a7cb9724bb624185bf15918de3aa5774d021123d7ae9596afcf0304f2d7e2\"" Dec 13 14:49:54.407240 systemd[1]: Started cri-containerd-801a7cb9724bb624185bf15918de3aa5774d021123d7ae9596afcf0304f2d7e2.scope. Dec 13 14:49:54.450215 kernel: kauditd_printk_skb: 614 callbacks suppressed Dec 13 14:49:54.450451 kernel: audit: type=1400 audit(1734101394.444:1134): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.450501 kernel: audit: type=1400 audit(1734101394.444:1135): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.458299 kernel: audit: type=1400 audit(1734101394.444:1136): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.465300 kernel: audit: type=1400 audit(1734101394.444:1137): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.465381 kernel: audit: type=1400 audit(1734101394.444:1138): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.465419 kernel: audit: type=1400 audit(1734101394.444:1139): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.469351 kernel: audit: type=1400 audit(1734101394.444:1140): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.475619 kernel: audit: type=1400 audit(1734101394.444:1141): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.479461 kernel: audit: type=1400 audit(1734101394.444:1142): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.482921 kernel: audit: type=1400 audit(1734101394.453:1143): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.453000 audit: BPF prog-id=162 op=LOAD Dec 13 14:49:54.457000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.457000 audit[4347]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=4306 pid=4347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:54.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830316137636239373234626236323431383562663135393138646533 Dec 13 14:49:54.457000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.457000 audit[4347]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=4306 pid=4347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:54.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830316137636239373234626236323431383562663135393138646533 Dec 13 14:49:54.457000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.457000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.457000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.457000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.457000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.457000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.457000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.457000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.457000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.457000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.457000 audit: BPF prog-id=163 op=LOAD Dec 13 14:49:54.457000 audit[4347]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c000212c80 items=0 ppid=4306 pid=4347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:54.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830316137636239373234626236323431383562663135393138646533 Dec 13 14:49:54.457000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.457000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.457000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.457000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.457000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.457000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.457000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.457000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.457000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.457000 audit: BPF prog-id=164 op=LOAD Dec 13 14:49:54.457000 audit[4347]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c000212cc8 items=0 ppid=4306 pid=4347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:54.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830316137636239373234626236323431383562663135393138646533 Dec 13 14:49:54.458000 audit: BPF prog-id=164 op=UNLOAD Dec 13 14:49:54.458000 audit: BPF prog-id=163 op=UNLOAD Dec 13 14:49:54.458000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.458000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.458000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.458000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.458000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.458000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.458000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.458000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.458000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.458000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:54.458000 audit: BPF prog-id=165 op=LOAD Dec 13 14:49:54.458000 audit[4347]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c0002130d8 items=0 ppid=4306 pid=4347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:54.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830316137636239373234626236323431383562663135393138646533 Dec 13 14:49:54.514484 env[1768]: time="2024-12-13T14:49:54.514447218Z" level=info msg="StopPodSandbox for \"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f\"" Dec 13 14:49:54.536976 env[1768]: time="2024-12-13T14:49:54.536917621Z" level=info msg="StartContainer for \"801a7cb9724bb624185bf15918de3aa5774d021123d7ae9596afcf0304f2d7e2\" returns successfully" Dec 13 14:49:54.629868 env[1768]: 2024-12-13 14:49:54.586 [INFO][4384] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" Dec 13 14:49:54.629868 env[1768]: 2024-12-13 14:49:54.586 [INFO][4384] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" iface="eth0" netns="/var/run/netns/cni-c970ecd0-5a61-d2bc-b733-918caff01dab" Dec 13 14:49:54.629868 env[1768]: 2024-12-13 14:49:54.586 [INFO][4384] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" iface="eth0" netns="/var/run/netns/cni-c970ecd0-5a61-d2bc-b733-918caff01dab" Dec 13 14:49:54.629868 env[1768]: 2024-12-13 14:49:54.586 [INFO][4384] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" iface="eth0" netns="/var/run/netns/cni-c970ecd0-5a61-d2bc-b733-918caff01dab" Dec 13 14:49:54.629868 env[1768]: 2024-12-13 14:49:54.586 [INFO][4384] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" Dec 13 14:49:54.629868 env[1768]: 2024-12-13 14:49:54.586 [INFO][4384] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" Dec 13 14:49:54.629868 env[1768]: 2024-12-13 14:49:54.616 [INFO][4392] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" HandleID="k8s-pod-network.5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0" Dec 13 14:49:54.629868 env[1768]: 2024-12-13 14:49:54.616 [INFO][4392] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:49:54.629868 env[1768]: 2024-12-13 14:49:54.616 [INFO][4392] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:49:54.629868 env[1768]: 2024-12-13 14:49:54.624 [WARNING][4392] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" HandleID="k8s-pod-network.5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0" Dec 13 14:49:54.629868 env[1768]: 2024-12-13 14:49:54.624 [INFO][4392] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" HandleID="k8s-pod-network.5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0" Dec 13 14:49:54.629868 env[1768]: 2024-12-13 14:49:54.626 [INFO][4392] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:49:54.629868 env[1768]: 2024-12-13 14:49:54.627 [INFO][4384] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" Dec 13 14:49:54.630627 env[1768]: time="2024-12-13T14:49:54.630015378Z" level=info msg="TearDown network for sandbox \"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f\" successfully" Dec 13 14:49:54.630627 env[1768]: time="2024-12-13T14:49:54.630052622Z" level=info msg="StopPodSandbox for \"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f\" returns successfully" Dec 13 14:49:54.630822 env[1768]: time="2024-12-13T14:49:54.630789925Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cbbfffd85-dl4wj,Uid:c3a29363-5614-4c3a-a49a-7a5afb98c592,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:49:54.838517 systemd-networkd[1461]: cali912957c5670: Link UP Dec 13 14:49:54.847590 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali912957c5670: link becomes ready Dec 13 14:49:54.846915 systemd-networkd[1461]: cali912957c5670: Gained carrier Dec 13 14:49:54.873184 kubelet[2628]: I1213 14:49:54.873121 2628 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-cj7kv" podStartSLOduration=36.873084757 podStartE2EDuration="36.873084757s" podCreationTimestamp="2024-12-13 14:49:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:49:54.821489569 +0000 UTC m=+41.607947494" watchObservedRunningTime="2024-12-13 14:49:54.873084757 +0000 UTC m=+41.659542681" Dec 13 14:49:54.877116 env[1768]: 2024-12-13 14:49:54.684 [INFO][4402] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0 calico-apiserver-5cbbfffd85- calico-apiserver c3a29363-5614-4c3a-a49a-7a5afb98c592 753 0 2024-12-13 14:49:28 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5cbbfffd85 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-25-13 calico-apiserver-5cbbfffd85-dl4wj eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali912957c5670 [] []}} ContainerID="b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373" Namespace="calico-apiserver" Pod="calico-apiserver-5cbbfffd85-dl4wj" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-" Dec 13 14:49:54.877116 env[1768]: 2024-12-13 14:49:54.684 [INFO][4402] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373" Namespace="calico-apiserver" Pod="calico-apiserver-5cbbfffd85-dl4wj" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0" Dec 13 14:49:54.877116 env[1768]: 2024-12-13 14:49:54.739 [INFO][4414] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373" HandleID="k8s-pod-network.b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0" Dec 13 14:49:54.877116 env[1768]: 2024-12-13 14:49:54.750 [INFO][4414] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373" HandleID="k8s-pod-network.b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00042b680), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-25-13", "pod":"calico-apiserver-5cbbfffd85-dl4wj", "timestamp":"2024-12-13 14:49:54.739793336 +0000 UTC"}, Hostname:"ip-172-31-25-13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:49:54.877116 env[1768]: 2024-12-13 14:49:54.750 [INFO][4414] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:49:54.877116 env[1768]: 2024-12-13 14:49:54.750 [INFO][4414] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:49:54.877116 env[1768]: 2024-12-13 14:49:54.750 [INFO][4414] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-25-13' Dec 13 14:49:54.877116 env[1768]: 2024-12-13 14:49:54.752 [INFO][4414] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373" host="ip-172-31-25-13" Dec 13 14:49:54.877116 env[1768]: 2024-12-13 14:49:54.757 [INFO][4414] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-25-13" Dec 13 14:49:54.877116 env[1768]: 2024-12-13 14:49:54.763 [INFO][4414] ipam/ipam.go 489: Trying affinity for 192.168.73.0/26 host="ip-172-31-25-13" Dec 13 14:49:54.877116 env[1768]: 2024-12-13 14:49:54.767 [INFO][4414] ipam/ipam.go 155: Attempting to load block cidr=192.168.73.0/26 host="ip-172-31-25-13" Dec 13 14:49:54.877116 env[1768]: 2024-12-13 14:49:54.774 [INFO][4414] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.73.0/26 host="ip-172-31-25-13" Dec 13 14:49:54.877116 env[1768]: 2024-12-13 14:49:54.775 [INFO][4414] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.73.0/26 handle="k8s-pod-network.b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373" host="ip-172-31-25-13" Dec 13 14:49:54.877116 env[1768]: 2024-12-13 14:49:54.781 [INFO][4414] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373 Dec 13 14:49:54.877116 env[1768]: 2024-12-13 14:49:54.798 [INFO][4414] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.73.0/26 handle="k8s-pod-network.b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373" host="ip-172-31-25-13" Dec 13 14:49:54.877116 env[1768]: 2024-12-13 14:49:54.823 [INFO][4414] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.73.2/26] block=192.168.73.0/26 handle="k8s-pod-network.b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373" host="ip-172-31-25-13" Dec 13 14:49:54.877116 env[1768]: 2024-12-13 14:49:54.823 [INFO][4414] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.73.2/26] handle="k8s-pod-network.b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373" host="ip-172-31-25-13" Dec 13 14:49:54.877116 env[1768]: 2024-12-13 14:49:54.823 [INFO][4414] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:49:54.877116 env[1768]: 2024-12-13 14:49:54.823 [INFO][4414] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.73.2/26] IPv6=[] ContainerID="b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373" HandleID="k8s-pod-network.b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0" Dec 13 14:49:54.878179 env[1768]: 2024-12-13 14:49:54.826 [INFO][4402] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373" Namespace="calico-apiserver" Pod="calico-apiserver-5cbbfffd85-dl4wj" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0", GenerateName:"calico-apiserver-5cbbfffd85-", Namespace:"calico-apiserver", SelfLink:"", UID:"c3a29363-5614-4c3a-a49a-7a5afb98c592", ResourceVersion:"753", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cbbfffd85", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"", Pod:"calico-apiserver-5cbbfffd85-dl4wj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.73.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali912957c5670", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:49:54.878179 env[1768]: 2024-12-13 14:49:54.826 [INFO][4402] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.73.2/32] ContainerID="b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373" Namespace="calico-apiserver" Pod="calico-apiserver-5cbbfffd85-dl4wj" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0" Dec 13 14:49:54.878179 env[1768]: 2024-12-13 14:49:54.826 [INFO][4402] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali912957c5670 ContainerID="b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373" Namespace="calico-apiserver" Pod="calico-apiserver-5cbbfffd85-dl4wj" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0" Dec 13 14:49:54.878179 env[1768]: 2024-12-13 14:49:54.847 [INFO][4402] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373" Namespace="calico-apiserver" Pod="calico-apiserver-5cbbfffd85-dl4wj" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0" Dec 13 14:49:54.878179 env[1768]: 2024-12-13 14:49:54.848 [INFO][4402] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373" Namespace="calico-apiserver" Pod="calico-apiserver-5cbbfffd85-dl4wj" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0", GenerateName:"calico-apiserver-5cbbfffd85-", Namespace:"calico-apiserver", SelfLink:"", UID:"c3a29363-5614-4c3a-a49a-7a5afb98c592", ResourceVersion:"753", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cbbfffd85", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373", Pod:"calico-apiserver-5cbbfffd85-dl4wj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.73.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali912957c5670", MAC:"7a:86:1c:e7:71:b9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:49:54.878179 env[1768]: 2024-12-13 14:49:54.874 [INFO][4402] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373" Namespace="calico-apiserver" Pod="calico-apiserver-5cbbfffd85-dl4wj" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0" Dec 13 14:49:54.905919 env[1768]: time="2024-12-13T14:49:54.905823142Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:49:54.905919 env[1768]: time="2024-12-13T14:49:54.905882744Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:49:54.905919 env[1768]: time="2024-12-13T14:49:54.905897704Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:49:54.906427 env[1768]: time="2024-12-13T14:49:54.906386558Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373 pid=4440 runtime=io.containerd.runc.v2 Dec 13 14:49:54.929959 systemd[1]: Started cri-containerd-b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373.scope. Dec 13 14:49:54.997000 audit[4460]: NETFILTER_CFG table=filter:102 family=2 entries=16 op=nft_register_rule pid=4460 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:49:54.997896 systemd[1]: run-netns-cni\x2dc970ecd0\x2d5a61\x2dd2bc\x2db733\x2d918caff01dab.mount: Deactivated successfully. Dec 13 14:49:54.997000 audit[4460]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff9f4440c0 a2=0 a3=7fff9f4440ac items=0 ppid=3063 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:54.997000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:55.021000 audit[4460]: NETFILTER_CFG table=nat:103 family=2 entries=14 op=nft_register_rule pid=4460 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:49:55.021000 audit[4460]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff9f4440c0 a2=0 a3=0 items=0 ppid=3063 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:55.021000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:55.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.035000 audit: BPF prog-id=166 op=LOAD Dec 13 14:49:55.036000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.036000 audit[4448]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4440 pid=4448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:55.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236373537353262303063303133626639383637646166393133353233 Dec 13 14:49:55.036000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.036000 audit[4448]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4440 pid=4448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:55.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236373537353262303063303133626639383637646166393133353233 Dec 13 14:49:55.037000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.037000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.037000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.037000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.037000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.037000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.037000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.037000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.037000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.037000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.037000 audit: BPF prog-id=167 op=LOAD Dec 13 14:49:55.037000 audit[4448]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001b9b10 items=0 ppid=4440 pid=4448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:55.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236373537353262303063303133626639383637646166393133353233 Dec 13 14:49:55.037000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.037000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.037000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.037000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.037000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.037000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.037000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.037000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.037000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.037000 audit: BPF prog-id=168 op=LOAD Dec 13 14:49:55.037000 audit[4448]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001b9b58 items=0 ppid=4440 pid=4448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:55.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236373537353262303063303133626639383637646166393133353233 Dec 13 14:49:55.038000 audit: BPF prog-id=168 op=UNLOAD Dec 13 14:49:55.038000 audit: BPF prog-id=167 op=UNLOAD Dec 13 14:49:55.038000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.038000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.038000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.038000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.038000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.038000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.038000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.038000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.038000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.038000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.038000 audit: BPF prog-id=169 op=LOAD Dec 13 14:49:55.038000 audit[4448]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001b9f68 items=0 ppid=4440 pid=4448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:55.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236373537353262303063303133626639383637646166393133353233 Dec 13 14:49:55.046000 audit[4470]: NETFILTER_CFG table=filter:104 family=2 entries=44 op=nft_register_chain pid=4470 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:49:55.046000 audit[4470]: SYSCALL arch=c000003e syscall=46 success=yes exit=24680 a0=3 a1=7ffc0c1c1480 a2=0 a3=7ffc0c1c146c items=0 ppid=4062 pid=4470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:55.046000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:49:55.092616 env[1768]: time="2024-12-13T14:49:55.088791200Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cbbfffd85-dl4wj,Uid:c3a29363-5614-4c3a-a49a-7a5afb98c592,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373\"" Dec 13 14:49:55.092975 env[1768]: time="2024-12-13T14:49:55.092937838Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:49:55.499373 env[1768]: time="2024-12-13T14:49:55.498552801Z" level=info msg="StopPodSandbox for \"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870\"" Dec 13 14:49:55.621133 env[1768]: 2024-12-13 14:49:55.571 [INFO][4497] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" Dec 13 14:49:55.621133 env[1768]: 2024-12-13 14:49:55.571 [INFO][4497] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" iface="eth0" netns="/var/run/netns/cni-738ba85d-f2de-d5ad-771e-3117836118cc" Dec 13 14:49:55.621133 env[1768]: 2024-12-13 14:49:55.571 [INFO][4497] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" iface="eth0" netns="/var/run/netns/cni-738ba85d-f2de-d5ad-771e-3117836118cc" Dec 13 14:49:55.621133 env[1768]: 2024-12-13 14:49:55.571 [INFO][4497] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" iface="eth0" netns="/var/run/netns/cni-738ba85d-f2de-d5ad-771e-3117836118cc" Dec 13 14:49:55.621133 env[1768]: 2024-12-13 14:49:55.571 [INFO][4497] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" Dec 13 14:49:55.621133 env[1768]: 2024-12-13 14:49:55.571 [INFO][4497] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" Dec 13 14:49:55.621133 env[1768]: 2024-12-13 14:49:55.608 [INFO][4503] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" HandleID="k8s-pod-network.01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" Workload="ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0" Dec 13 14:49:55.621133 env[1768]: 2024-12-13 14:49:55.608 [INFO][4503] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:49:55.621133 env[1768]: 2024-12-13 14:49:55.608 [INFO][4503] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:49:55.621133 env[1768]: 2024-12-13 14:49:55.616 [WARNING][4503] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" HandleID="k8s-pod-network.01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" Workload="ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0" Dec 13 14:49:55.621133 env[1768]: 2024-12-13 14:49:55.616 [INFO][4503] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" HandleID="k8s-pod-network.01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" Workload="ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0" Dec 13 14:49:55.621133 env[1768]: 2024-12-13 14:49:55.617 [INFO][4503] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:49:55.621133 env[1768]: 2024-12-13 14:49:55.619 [INFO][4497] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" Dec 13 14:49:55.624216 env[1768]: time="2024-12-13T14:49:55.621383037Z" level=info msg="TearDown network for sandbox \"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870\" successfully" Dec 13 14:49:55.624216 env[1768]: time="2024-12-13T14:49:55.621420810Z" level=info msg="StopPodSandbox for \"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870\" returns successfully" Dec 13 14:49:55.624216 env[1768]: time="2024-12-13T14:49:55.622214713Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5dmvf,Uid:4829ad21-050f-4e15-8ac8-fbe8a63d9b6a,Namespace:calico-system,Attempt:1,}" Dec 13 14:49:55.624349 systemd[1]: run-netns-cni\x2d738ba85d\x2df2de\x2dd5ad\x2d771e\x2d3117836118cc.mount: Deactivated successfully. Dec 13 14:49:55.790361 systemd-networkd[1461]: cali478931436d5: Link UP Dec 13 14:49:55.798422 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:49:55.798527 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali478931436d5: link becomes ready Dec 13 14:49:55.798163 systemd-networkd[1461]: cali478931436d5: Gained carrier Dec 13 14:49:55.823896 env[1768]: 2024-12-13 14:49:55.690 [INFO][4510] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0 csi-node-driver- calico-system 4829ad21-050f-4e15-8ac8-fbe8a63d9b6a 766 0 2024-12-13 14:49:28 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ip-172-31-25-13 csi-node-driver-5dmvf eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali478931436d5 [] []}} ContainerID="833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4" Namespace="calico-system" Pod="csi-node-driver-5dmvf" WorkloadEndpoint="ip--172--31--25--13-k8s-csi--node--driver--5dmvf-" Dec 13 14:49:55.823896 env[1768]: 2024-12-13 14:49:55.691 [INFO][4510] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4" Namespace="calico-system" Pod="csi-node-driver-5dmvf" WorkloadEndpoint="ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0" Dec 13 14:49:55.823896 env[1768]: 2024-12-13 14:49:55.721 [INFO][4521] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4" HandleID="k8s-pod-network.833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4" Workload="ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0" Dec 13 14:49:55.823896 env[1768]: 2024-12-13 14:49:55.734 [INFO][4521] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4" HandleID="k8s-pod-network.833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4" Workload="ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318ab0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-25-13", "pod":"csi-node-driver-5dmvf", "timestamp":"2024-12-13 14:49:55.721771945 +0000 UTC"}, Hostname:"ip-172-31-25-13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:49:55.823896 env[1768]: 2024-12-13 14:49:55.734 [INFO][4521] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:49:55.823896 env[1768]: 2024-12-13 14:49:55.734 [INFO][4521] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:49:55.823896 env[1768]: 2024-12-13 14:49:55.734 [INFO][4521] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-25-13' Dec 13 14:49:55.823896 env[1768]: 2024-12-13 14:49:55.736 [INFO][4521] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4" host="ip-172-31-25-13" Dec 13 14:49:55.823896 env[1768]: 2024-12-13 14:49:55.741 [INFO][4521] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-25-13" Dec 13 14:49:55.823896 env[1768]: 2024-12-13 14:49:55.745 [INFO][4521] ipam/ipam.go 489: Trying affinity for 192.168.73.0/26 host="ip-172-31-25-13" Dec 13 14:49:55.823896 env[1768]: 2024-12-13 14:49:55.747 [INFO][4521] ipam/ipam.go 155: Attempting to load block cidr=192.168.73.0/26 host="ip-172-31-25-13" Dec 13 14:49:55.823896 env[1768]: 2024-12-13 14:49:55.753 [INFO][4521] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.73.0/26 host="ip-172-31-25-13" Dec 13 14:49:55.823896 env[1768]: 2024-12-13 14:49:55.754 [INFO][4521] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.73.0/26 handle="k8s-pod-network.833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4" host="ip-172-31-25-13" Dec 13 14:49:55.823896 env[1768]: 2024-12-13 14:49:55.756 [INFO][4521] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4 Dec 13 14:49:55.823896 env[1768]: 2024-12-13 14:49:55.761 [INFO][4521] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.73.0/26 handle="k8s-pod-network.833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4" host="ip-172-31-25-13" Dec 13 14:49:55.823896 env[1768]: 2024-12-13 14:49:55.770 [INFO][4521] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.73.3/26] block=192.168.73.0/26 handle="k8s-pod-network.833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4" host="ip-172-31-25-13" Dec 13 14:49:55.823896 env[1768]: 2024-12-13 14:49:55.770 [INFO][4521] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.73.3/26] handle="k8s-pod-network.833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4" host="ip-172-31-25-13" Dec 13 14:49:55.823896 env[1768]: 2024-12-13 14:49:55.770 [INFO][4521] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:49:55.823896 env[1768]: 2024-12-13 14:49:55.771 [INFO][4521] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.73.3/26] IPv6=[] ContainerID="833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4" HandleID="k8s-pod-network.833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4" Workload="ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0" Dec 13 14:49:55.825038 env[1768]: 2024-12-13 14:49:55.775 [INFO][4510] cni-plugin/k8s.go 386: Populated endpoint ContainerID="833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4" Namespace="calico-system" Pod="csi-node-driver-5dmvf" WorkloadEndpoint="ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4829ad21-050f-4e15-8ac8-fbe8a63d9b6a", ResourceVersion:"766", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"", Pod:"csi-node-driver-5dmvf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.73.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali478931436d5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:49:55.825038 env[1768]: 2024-12-13 14:49:55.775 [INFO][4510] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.73.3/32] ContainerID="833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4" Namespace="calico-system" Pod="csi-node-driver-5dmvf" WorkloadEndpoint="ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0" Dec 13 14:49:55.825038 env[1768]: 2024-12-13 14:49:55.775 [INFO][4510] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali478931436d5 ContainerID="833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4" Namespace="calico-system" Pod="csi-node-driver-5dmvf" WorkloadEndpoint="ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0" Dec 13 14:49:55.825038 env[1768]: 2024-12-13 14:49:55.801 [INFO][4510] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4" Namespace="calico-system" Pod="csi-node-driver-5dmvf" WorkloadEndpoint="ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0" Dec 13 14:49:55.825038 env[1768]: 2024-12-13 14:49:55.804 [INFO][4510] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4" Namespace="calico-system" Pod="csi-node-driver-5dmvf" WorkloadEndpoint="ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4829ad21-050f-4e15-8ac8-fbe8a63d9b6a", ResourceVersion:"766", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4", Pod:"csi-node-driver-5dmvf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.73.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali478931436d5", MAC:"46:0c:e2:ea:22:fb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:49:55.825038 env[1768]: 2024-12-13 14:49:55.821 [INFO][4510] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4" Namespace="calico-system" Pod="csi-node-driver-5dmvf" WorkloadEndpoint="ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0" Dec 13 14:49:55.844717 env[1768]: time="2024-12-13T14:49:55.844621510Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:49:55.844717 env[1768]: time="2024-12-13T14:49:55.844673761Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:49:55.845016 env[1768]: time="2024-12-13T14:49:55.844689861Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:49:55.845016 env[1768]: time="2024-12-13T14:49:55.844871281Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4 pid=4549 runtime=io.containerd.runc.v2 Dec 13 14:49:55.871393 systemd[1]: Started cri-containerd-833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4.scope. Dec 13 14:49:55.856000 audit[4557]: NETFILTER_CFG table=filter:105 family=2 entries=13 op=nft_register_rule pid=4557 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:49:55.856000 audit[4557]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd55d6a0a0 a2=0 a3=7ffd55d6a08c items=0 ppid=3063 pid=4557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:55.856000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:55.887000 audit[4557]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=4557 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:49:55.887000 audit[4557]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd55d6a0a0 a2=0 a3=7ffd55d6a08c items=0 ppid=3063 pid=4557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:55.887000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:55.904000 audit[4576]: NETFILTER_CFG table=filter:107 family=2 entries=42 op=nft_register_chain pid=4576 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:49:55.904000 audit[4576]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7ffeead2a8c0 a2=0 a3=7ffeead2a8ac items=0 ppid=4062 pid=4576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:55.904000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:49:55.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.909000 audit: BPF prog-id=170 op=LOAD Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=4549 pid=4558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:55.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833336161383438383333323330336561653339373837666265663032 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=4549 pid=4558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:55.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833336161383438383333323330336561653339373837666265663032 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit: BPF prog-id=171 op=LOAD Dec 13 14:49:55.910000 audit[4558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000024940 items=0 ppid=4549 pid=4558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:55.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833336161383438383333323330336561653339373837666265663032 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit: BPF prog-id=172 op=LOAD Dec 13 14:49:55.910000 audit[4558]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000024988 items=0 ppid=4549 pid=4558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:55.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833336161383438383333323330336561653339373837666265663032 Dec 13 14:49:55.910000 audit: BPF prog-id=172 op=UNLOAD Dec 13 14:49:55.910000 audit: BPF prog-id=171 op=UNLOAD Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:55.910000 audit: BPF prog-id=173 op=LOAD Dec 13 14:49:55.910000 audit[4558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000024d98 items=0 ppid=4549 pid=4558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:55.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833336161383438383333323330336561653339373837666265663032 Dec 13 14:49:55.933201 env[1768]: time="2024-12-13T14:49:55.933156920Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5dmvf,Uid:4829ad21-050f-4e15-8ac8-fbe8a63d9b6a,Namespace:calico-system,Attempt:1,} returns sandbox id \"833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4\"" Dec 13 14:49:56.092359 systemd-networkd[1461]: calib3f765f085b: Gained IPv6LL Dec 13 14:49:56.218437 systemd-networkd[1461]: cali912957c5670: Gained IPv6LL Dec 13 14:49:56.498487 env[1768]: time="2024-12-13T14:49:56.497753102Z" level=info msg="StopPodSandbox for \"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1\"" Dec 13 14:49:56.502359 env[1768]: time="2024-12-13T14:49:56.502311405Z" level=info msg="StopPodSandbox for \"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437\"" Dec 13 14:49:56.805769 env[1768]: 2024-12-13 14:49:56.647 [INFO][4615] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" Dec 13 14:49:56.805769 env[1768]: 2024-12-13 14:49:56.647 [INFO][4615] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" iface="eth0" netns="/var/run/netns/cni-c5958515-1848-b1a2-5d7f-cae02bdaa5ef" Dec 13 14:49:56.805769 env[1768]: 2024-12-13 14:49:56.647 [INFO][4615] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" iface="eth0" netns="/var/run/netns/cni-c5958515-1848-b1a2-5d7f-cae02bdaa5ef" Dec 13 14:49:56.805769 env[1768]: 2024-12-13 14:49:56.647 [INFO][4615] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" iface="eth0" netns="/var/run/netns/cni-c5958515-1848-b1a2-5d7f-cae02bdaa5ef" Dec 13 14:49:56.805769 env[1768]: 2024-12-13 14:49:56.647 [INFO][4615] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" Dec 13 14:49:56.805769 env[1768]: 2024-12-13 14:49:56.648 [INFO][4615] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" Dec 13 14:49:56.805769 env[1768]: 2024-12-13 14:49:56.789 [INFO][4630] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" HandleID="k8s-pod-network.991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0" Dec 13 14:49:56.805769 env[1768]: 2024-12-13 14:49:56.789 [INFO][4630] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:49:56.805769 env[1768]: 2024-12-13 14:49:56.790 [INFO][4630] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:49:56.805769 env[1768]: 2024-12-13 14:49:56.797 [WARNING][4630] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" HandleID="k8s-pod-network.991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0" Dec 13 14:49:56.805769 env[1768]: 2024-12-13 14:49:56.797 [INFO][4630] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" HandleID="k8s-pod-network.991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0" Dec 13 14:49:56.805769 env[1768]: 2024-12-13 14:49:56.799 [INFO][4630] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:49:56.805769 env[1768]: 2024-12-13 14:49:56.802 [INFO][4615] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" Dec 13 14:49:56.811793 env[1768]: time="2024-12-13T14:49:56.811407337Z" level=info msg="TearDown network for sandbox \"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1\" successfully" Dec 13 14:49:56.811793 env[1768]: time="2024-12-13T14:49:56.811454154Z" level=info msg="StopPodSandbox for \"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1\" returns successfully" Dec 13 14:49:56.809700 systemd[1]: run-netns-cni\x2dc5958515\x2d1848\x2db1a2\x2d5d7f\x2dcae02bdaa5ef.mount: Deactivated successfully. Dec 13 14:49:56.812683 env[1768]: time="2024-12-13T14:49:56.812646726Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-6rqpd,Uid:5d2c84cb-46ac-42d4-bbcb-b6e69aa931ca,Namespace:kube-system,Attempt:1,}" Dec 13 14:49:56.836631 env[1768]: 2024-12-13 14:49:56.696 [INFO][4623] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" Dec 13 14:49:56.836631 env[1768]: 2024-12-13 14:49:56.696 [INFO][4623] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" iface="eth0" netns="/var/run/netns/cni-6fb0a231-8bce-7e0d-7a61-527092999d09" Dec 13 14:49:56.836631 env[1768]: 2024-12-13 14:49:56.696 [INFO][4623] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" iface="eth0" netns="/var/run/netns/cni-6fb0a231-8bce-7e0d-7a61-527092999d09" Dec 13 14:49:56.836631 env[1768]: 2024-12-13 14:49:56.697 [INFO][4623] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" iface="eth0" netns="/var/run/netns/cni-6fb0a231-8bce-7e0d-7a61-527092999d09" Dec 13 14:49:56.836631 env[1768]: 2024-12-13 14:49:56.697 [INFO][4623] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" Dec 13 14:49:56.836631 env[1768]: 2024-12-13 14:49:56.697 [INFO][4623] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" Dec 13 14:49:56.836631 env[1768]: 2024-12-13 14:49:56.819 [INFO][4635] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" HandleID="k8s-pod-network.79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0" Dec 13 14:49:56.836631 env[1768]: 2024-12-13 14:49:56.820 [INFO][4635] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:49:56.836631 env[1768]: 2024-12-13 14:49:56.820 [INFO][4635] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:49:56.836631 env[1768]: 2024-12-13 14:49:56.828 [WARNING][4635] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" HandleID="k8s-pod-network.79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0" Dec 13 14:49:56.836631 env[1768]: 2024-12-13 14:49:56.828 [INFO][4635] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" HandleID="k8s-pod-network.79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0" Dec 13 14:49:56.836631 env[1768]: 2024-12-13 14:49:56.830 [INFO][4635] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:49:56.836631 env[1768]: 2024-12-13 14:49:56.833 [INFO][4623] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" Dec 13 14:49:56.842579 systemd[1]: run-netns-cni\x2d6fb0a231\x2d8bce\x2d7e0d\x2d7a61\x2d527092999d09.mount: Deactivated successfully. Dec 13 14:49:56.844039 env[1768]: time="2024-12-13T14:49:56.843991424Z" level=info msg="TearDown network for sandbox \"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437\" successfully" Dec 13 14:49:56.844475 env[1768]: time="2024-12-13T14:49:56.844447423Z" level=info msg="StopPodSandbox for \"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437\" returns successfully" Dec 13 14:49:56.862790 env[1768]: time="2024-12-13T14:49:56.862614195Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cbbfffd85-44tds,Uid:6051e298-e50c-4744-bd52-0b5ad22e6435,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:49:57.108012 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:49:57.108151 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali173cd2fa4c4: link becomes ready Dec 13 14:49:57.107749 systemd-networkd[1461]: cali173cd2fa4c4: Link UP Dec 13 14:49:57.107950 systemd-networkd[1461]: cali173cd2fa4c4: Gained carrier Dec 13 14:49:57.140718 env[1768]: 2024-12-13 14:49:56.977 [INFO][4643] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0 coredns-6f6b679f8f- kube-system 5d2c84cb-46ac-42d4-bbcb-b6e69aa931ca 778 0 2024-12-13 14:49:18 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-25-13 coredns-6f6b679f8f-6rqpd eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali173cd2fa4c4 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197" Namespace="kube-system" Pod="coredns-6f6b679f8f-6rqpd" WorkloadEndpoint="ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-" Dec 13 14:49:57.140718 env[1768]: 2024-12-13 14:49:56.978 [INFO][4643] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197" Namespace="kube-system" Pod="coredns-6f6b679f8f-6rqpd" WorkloadEndpoint="ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0" Dec 13 14:49:57.140718 env[1768]: 2024-12-13 14:49:57.030 [INFO][4674] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197" HandleID="k8s-pod-network.eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0" Dec 13 14:49:57.140718 env[1768]: 2024-12-13 14:49:57.041 [INFO][4674] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197" HandleID="k8s-pod-network.eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000311160), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-25-13", "pod":"coredns-6f6b679f8f-6rqpd", "timestamp":"2024-12-13 14:49:57.030892405 +0000 UTC"}, Hostname:"ip-172-31-25-13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:49:57.140718 env[1768]: 2024-12-13 14:49:57.042 [INFO][4674] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:49:57.140718 env[1768]: 2024-12-13 14:49:57.042 [INFO][4674] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:49:57.140718 env[1768]: 2024-12-13 14:49:57.042 [INFO][4674] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-25-13' Dec 13 14:49:57.140718 env[1768]: 2024-12-13 14:49:57.044 [INFO][4674] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197" host="ip-172-31-25-13" Dec 13 14:49:57.140718 env[1768]: 2024-12-13 14:49:57.049 [INFO][4674] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-25-13" Dec 13 14:49:57.140718 env[1768]: 2024-12-13 14:49:57.054 [INFO][4674] ipam/ipam.go 489: Trying affinity for 192.168.73.0/26 host="ip-172-31-25-13" Dec 13 14:49:57.140718 env[1768]: 2024-12-13 14:49:57.057 [INFO][4674] ipam/ipam.go 155: Attempting to load block cidr=192.168.73.0/26 host="ip-172-31-25-13" Dec 13 14:49:57.140718 env[1768]: 2024-12-13 14:49:57.067 [INFO][4674] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.73.0/26 host="ip-172-31-25-13" Dec 13 14:49:57.140718 env[1768]: 2024-12-13 14:49:57.067 [INFO][4674] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.73.0/26 handle="k8s-pod-network.eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197" host="ip-172-31-25-13" Dec 13 14:49:57.140718 env[1768]: 2024-12-13 14:49:57.070 [INFO][4674] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197 Dec 13 14:49:57.140718 env[1768]: 2024-12-13 14:49:57.076 [INFO][4674] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.73.0/26 handle="k8s-pod-network.eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197" host="ip-172-31-25-13" Dec 13 14:49:57.140718 env[1768]: 2024-12-13 14:49:57.098 [INFO][4674] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.73.4/26] block=192.168.73.0/26 handle="k8s-pod-network.eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197" host="ip-172-31-25-13" Dec 13 14:49:57.140718 env[1768]: 2024-12-13 14:49:57.098 [INFO][4674] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.73.4/26] handle="k8s-pod-network.eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197" host="ip-172-31-25-13" Dec 13 14:49:57.140718 env[1768]: 2024-12-13 14:49:57.098 [INFO][4674] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:49:57.140718 env[1768]: 2024-12-13 14:49:57.098 [INFO][4674] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.73.4/26] IPv6=[] ContainerID="eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197" HandleID="k8s-pod-network.eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0" Dec 13 14:49:57.141729 env[1768]: 2024-12-13 14:49:57.101 [INFO][4643] cni-plugin/k8s.go 386: Populated endpoint ContainerID="eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197" Namespace="kube-system" Pod="coredns-6f6b679f8f-6rqpd" WorkloadEndpoint="ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"5d2c84cb-46ac-42d4-bbcb-b6e69aa931ca", ResourceVersion:"778", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"", Pod:"coredns-6f6b679f8f-6rqpd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.73.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali173cd2fa4c4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:49:57.141729 env[1768]: 2024-12-13 14:49:57.101 [INFO][4643] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.73.4/32] ContainerID="eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197" Namespace="kube-system" Pod="coredns-6f6b679f8f-6rqpd" WorkloadEndpoint="ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0" Dec 13 14:49:57.141729 env[1768]: 2024-12-13 14:49:57.101 [INFO][4643] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali173cd2fa4c4 ContainerID="eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197" Namespace="kube-system" Pod="coredns-6f6b679f8f-6rqpd" WorkloadEndpoint="ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0" Dec 13 14:49:57.141729 env[1768]: 2024-12-13 14:49:57.114 [INFO][4643] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197" Namespace="kube-system" Pod="coredns-6f6b679f8f-6rqpd" WorkloadEndpoint="ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0" Dec 13 14:49:57.141729 env[1768]: 2024-12-13 14:49:57.115 [INFO][4643] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197" Namespace="kube-system" Pod="coredns-6f6b679f8f-6rqpd" WorkloadEndpoint="ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"5d2c84cb-46ac-42d4-bbcb-b6e69aa931ca", ResourceVersion:"778", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197", Pod:"coredns-6f6b679f8f-6rqpd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.73.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali173cd2fa4c4", MAC:"22:ca:75:bd:45:ea", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:49:57.141729 env[1768]: 2024-12-13 14:49:57.133 [INFO][4643] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197" Namespace="kube-system" Pod="coredns-6f6b679f8f-6rqpd" WorkloadEndpoint="ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0" Dec 13 14:49:57.199000 audit[4692]: NETFILTER_CFG table=filter:108 family=2 entries=38 op=nft_register_chain pid=4692 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:49:57.199000 audit[4692]: SYSCALL arch=c000003e syscall=46 success=yes exit=19408 a0=3 a1=7ffd472ff8d0 a2=0 a3=7ffd472ff8bc items=0 ppid=4062 pid=4692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:57.199000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:49:57.179505 systemd-networkd[1461]: cali478931436d5: Gained IPv6LL Dec 13 14:49:57.280434 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0e94f89924b: link becomes ready Dec 13 14:49:57.280355 systemd-networkd[1461]: cali0e94f89924b: Link UP Dec 13 14:49:57.282382 systemd-networkd[1461]: cali0e94f89924b: Gained carrier Dec 13 14:49:57.306859 env[1768]: 2024-12-13 14:49:56.970 [INFO][4656] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0 calico-apiserver-5cbbfffd85- calico-apiserver 6051e298-e50c-4744-bd52-0b5ad22e6435 779 0 2024-12-13 14:49:28 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5cbbfffd85 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-25-13 calico-apiserver-5cbbfffd85-44tds eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali0e94f89924b [] []}} ContainerID="61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5" Namespace="calico-apiserver" Pod="calico-apiserver-5cbbfffd85-44tds" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-" Dec 13 14:49:57.306859 env[1768]: 2024-12-13 14:49:56.970 [INFO][4656] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5" Namespace="calico-apiserver" Pod="calico-apiserver-5cbbfffd85-44tds" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0" Dec 13 14:49:57.306859 env[1768]: 2024-12-13 14:49:57.045 [INFO][4670] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5" HandleID="k8s-pod-network.61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0" Dec 13 14:49:57.306859 env[1768]: 2024-12-13 14:49:57.055 [INFO][4670] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5" HandleID="k8s-pod-network.61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002852e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-25-13", "pod":"calico-apiserver-5cbbfffd85-44tds", "timestamp":"2024-12-13 14:49:57.045353977 +0000 UTC"}, Hostname:"ip-172-31-25-13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:49:57.306859 env[1768]: 2024-12-13 14:49:57.055 [INFO][4670] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:49:57.306859 env[1768]: 2024-12-13 14:49:57.098 [INFO][4670] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:49:57.306859 env[1768]: 2024-12-13 14:49:57.098 [INFO][4670] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-25-13' Dec 13 14:49:57.306859 env[1768]: 2024-12-13 14:49:57.145 [INFO][4670] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5" host="ip-172-31-25-13" Dec 13 14:49:57.306859 env[1768]: 2024-12-13 14:49:57.166 [INFO][4670] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-25-13" Dec 13 14:49:57.306859 env[1768]: 2024-12-13 14:49:57.241 [INFO][4670] ipam/ipam.go 489: Trying affinity for 192.168.73.0/26 host="ip-172-31-25-13" Dec 13 14:49:57.306859 env[1768]: 2024-12-13 14:49:57.243 [INFO][4670] ipam/ipam.go 155: Attempting to load block cidr=192.168.73.0/26 host="ip-172-31-25-13" Dec 13 14:49:57.306859 env[1768]: 2024-12-13 14:49:57.247 [INFO][4670] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.73.0/26 host="ip-172-31-25-13" Dec 13 14:49:57.306859 env[1768]: 2024-12-13 14:49:57.247 [INFO][4670] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.73.0/26 handle="k8s-pod-network.61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5" host="ip-172-31-25-13" Dec 13 14:49:57.306859 env[1768]: 2024-12-13 14:49:57.249 [INFO][4670] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5 Dec 13 14:49:57.306859 env[1768]: 2024-12-13 14:49:57.256 [INFO][4670] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.73.0/26 handle="k8s-pod-network.61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5" host="ip-172-31-25-13" Dec 13 14:49:57.306859 env[1768]: 2024-12-13 14:49:57.269 [INFO][4670] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.73.5/26] block=192.168.73.0/26 handle="k8s-pod-network.61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5" host="ip-172-31-25-13" Dec 13 14:49:57.306859 env[1768]: 2024-12-13 14:49:57.269 [INFO][4670] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.73.5/26] handle="k8s-pod-network.61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5" host="ip-172-31-25-13" Dec 13 14:49:57.306859 env[1768]: 2024-12-13 14:49:57.270 [INFO][4670] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:49:57.306859 env[1768]: 2024-12-13 14:49:57.270 [INFO][4670] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.73.5/26] IPv6=[] ContainerID="61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5" HandleID="k8s-pod-network.61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0" Dec 13 14:49:57.307826 env[1768]: 2024-12-13 14:49:57.273 [INFO][4656] cni-plugin/k8s.go 386: Populated endpoint ContainerID="61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5" Namespace="calico-apiserver" Pod="calico-apiserver-5cbbfffd85-44tds" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0", GenerateName:"calico-apiserver-5cbbfffd85-", Namespace:"calico-apiserver", SelfLink:"", UID:"6051e298-e50c-4744-bd52-0b5ad22e6435", ResourceVersion:"779", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cbbfffd85", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"", Pod:"calico-apiserver-5cbbfffd85-44tds", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.73.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0e94f89924b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:49:57.307826 env[1768]: 2024-12-13 14:49:57.273 [INFO][4656] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.73.5/32] ContainerID="61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5" Namespace="calico-apiserver" Pod="calico-apiserver-5cbbfffd85-44tds" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0" Dec 13 14:49:57.307826 env[1768]: 2024-12-13 14:49:57.273 [INFO][4656] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0e94f89924b ContainerID="61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5" Namespace="calico-apiserver" Pod="calico-apiserver-5cbbfffd85-44tds" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0" Dec 13 14:49:57.307826 env[1768]: 2024-12-13 14:49:57.278 [INFO][4656] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5" Namespace="calico-apiserver" Pod="calico-apiserver-5cbbfffd85-44tds" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0" Dec 13 14:49:57.307826 env[1768]: 2024-12-13 14:49:57.288 [INFO][4656] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5" Namespace="calico-apiserver" Pod="calico-apiserver-5cbbfffd85-44tds" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0", GenerateName:"calico-apiserver-5cbbfffd85-", Namespace:"calico-apiserver", SelfLink:"", UID:"6051e298-e50c-4744-bd52-0b5ad22e6435", ResourceVersion:"779", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cbbfffd85", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5", Pod:"calico-apiserver-5cbbfffd85-44tds", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.73.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0e94f89924b", MAC:"d2:2b:aa:d9:3d:74", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:49:57.307826 env[1768]: 2024-12-13 14:49:57.304 [INFO][4656] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5" Namespace="calico-apiserver" Pod="calico-apiserver-5cbbfffd85-44tds" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0" Dec 13 14:49:57.348000 audit[4715]: NETFILTER_CFG table=filter:109 family=2 entries=46 op=nft_register_chain pid=4715 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:49:57.348000 audit[4715]: SYSCALL arch=c000003e syscall=46 success=yes exit=23892 a0=3 a1=7fff4be67340 a2=0 a3=7fff4be6732c items=0 ppid=4062 pid=4715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:57.348000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:49:57.355125 env[1768]: time="2024-12-13T14:49:57.355050508Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:49:57.355506 env[1768]: time="2024-12-13T14:49:57.355474131Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:49:57.355627 env[1768]: time="2024-12-13T14:49:57.355604011Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:49:57.355897 env[1768]: time="2024-12-13T14:49:57.355866658Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197 pid=4723 runtime=io.containerd.runc.v2 Dec 13 14:49:57.383749 env[1768]: time="2024-12-13T14:49:57.383617783Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:49:57.383958 env[1768]: time="2024-12-13T14:49:57.383928027Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:49:57.384067 env[1768]: time="2024-12-13T14:49:57.384043233Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:49:57.384504 env[1768]: time="2024-12-13T14:49:57.384409662Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5 pid=4738 runtime=io.containerd.runc.v2 Dec 13 14:49:57.426461 systemd[1]: Started cri-containerd-eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197.scope. Dec 13 14:49:57.451621 systemd[1]: run-containerd-runc-k8s.io-eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197-runc.b52IpM.mount: Deactivated successfully. Dec 13 14:49:57.472406 systemd[1]: Started cri-containerd-61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5.scope. Dec 13 14:49:57.504234 env[1768]: time="2024-12-13T14:49:57.504191393Z" level=info msg="StopPodSandbox for \"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f\"" Dec 13 14:49:57.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.523000 audit: BPF prog-id=174 op=LOAD Dec 13 14:49:57.524000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.524000 audit[4739]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4723 pid=4739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:57.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565653636626164313464616637633538326433313066346438343030 Dec 13 14:49:57.524000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.524000 audit[4739]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4723 pid=4739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:57.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565653636626164313464616637633538326433313066346438343030 Dec 13 14:49:57.524000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.524000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.524000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.524000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.524000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.524000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.524000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.524000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.524000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.524000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.524000 audit: BPF prog-id=175 op=LOAD Dec 13 14:49:57.524000 audit[4739]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000388ec0 items=0 ppid=4723 pid=4739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:57.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565653636626164313464616637633538326433313066346438343030 Dec 13 14:49:57.524000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.524000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.524000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.524000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.524000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.524000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.524000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.524000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.524000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.524000 audit: BPF prog-id=176 op=LOAD Dec 13 14:49:57.524000 audit[4739]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000388f08 items=0 ppid=4723 pid=4739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:57.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565653636626164313464616637633538326433313066346438343030 Dec 13 14:49:57.524000 audit: BPF prog-id=176 op=UNLOAD Dec 13 14:49:57.524000 audit: BPF prog-id=175 op=UNLOAD Dec 13 14:49:57.528000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.528000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.528000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.528000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.528000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.528000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.528000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.528000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.528000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.528000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.528000 audit: BPF prog-id=177 op=LOAD Dec 13 14:49:57.528000 audit[4739]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000389318 items=0 ppid=4723 pid=4739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:57.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565653636626164313464616637633538326433313066346438343030 Dec 13 14:49:57.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.549000 audit: BPF prog-id=178 op=LOAD Dec 13 14:49:57.549000 audit[4754]: AVC avc: denied { bpf } for pid=4754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.549000 audit[4754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4738 pid=4754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:57.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631636139666434343930343836643165343432353163356262333161 Dec 13 14:49:57.550000 audit[4754]: AVC avc: denied { perfmon } for pid=4754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.550000 audit[4754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4738 pid=4754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:57.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631636139666434343930343836643165343432353163356262333161 Dec 13 14:49:57.550000 audit[4754]: AVC avc: denied { bpf } for pid=4754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.550000 audit[4754]: AVC avc: denied { bpf } for pid=4754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.550000 audit[4754]: AVC avc: denied { bpf } for pid=4754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.550000 audit[4754]: AVC avc: denied { perfmon } for pid=4754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.550000 audit[4754]: AVC avc: denied { perfmon } for pid=4754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.550000 audit[4754]: AVC avc: denied { perfmon } for pid=4754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.550000 audit[4754]: AVC avc: denied { perfmon } for pid=4754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.550000 audit[4754]: AVC avc: denied { perfmon } for pid=4754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.550000 audit[4754]: AVC avc: denied { bpf } for pid=4754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.550000 audit[4754]: AVC avc: denied { bpf } for pid=4754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.550000 audit: BPF prog-id=179 op=LOAD Dec 13 14:49:57.550000 audit[4754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000300ed0 items=0 ppid=4738 pid=4754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:57.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631636139666434343930343836643165343432353163356262333161 Dec 13 14:49:57.550000 audit[4754]: AVC avc: denied { bpf } for pid=4754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.550000 audit[4754]: AVC avc: denied { bpf } for pid=4754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.550000 audit[4754]: AVC avc: denied { perfmon } for pid=4754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.550000 audit[4754]: AVC avc: denied { perfmon } for pid=4754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.550000 audit[4754]: AVC avc: denied { perfmon } for pid=4754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.550000 audit[4754]: AVC avc: denied { perfmon } for pid=4754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.550000 audit[4754]: AVC avc: denied { perfmon } for pid=4754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.550000 audit[4754]: AVC avc: denied { bpf } for pid=4754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.550000 audit[4754]: AVC avc: denied { bpf } for pid=4754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.550000 audit: BPF prog-id=180 op=LOAD Dec 13 14:49:57.550000 audit[4754]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000300f18 items=0 ppid=4738 pid=4754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:57.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631636139666434343930343836643165343432353163356262333161 Dec 13 14:49:57.551000 audit: BPF prog-id=180 op=UNLOAD Dec 13 14:49:57.552000 audit: BPF prog-id=179 op=UNLOAD Dec 13 14:49:57.552000 audit[4754]: AVC avc: denied { bpf } for pid=4754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.552000 audit[4754]: AVC avc: denied { bpf } for pid=4754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.552000 audit[4754]: AVC avc: denied { bpf } for pid=4754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.552000 audit[4754]: AVC avc: denied { perfmon } for pid=4754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.552000 audit[4754]: AVC avc: denied { perfmon } for pid=4754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.552000 audit[4754]: AVC avc: denied { perfmon } for pid=4754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.552000 audit[4754]: AVC avc: denied { perfmon } for pid=4754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.552000 audit[4754]: AVC avc: denied { perfmon } for pid=4754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.552000 audit[4754]: AVC avc: denied { bpf } for pid=4754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.552000 audit[4754]: AVC avc: denied { bpf } for pid=4754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.552000 audit: BPF prog-id=181 op=LOAD Dec 13 14:49:57.552000 audit[4754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000301328 items=0 ppid=4738 pid=4754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:57.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631636139666434343930343836643165343432353163356262333161 Dec 13 14:49:57.644552 env[1768]: time="2024-12-13T14:49:57.644390604Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-6rqpd,Uid:5d2c84cb-46ac-42d4-bbcb-b6e69aa931ca,Namespace:kube-system,Attempt:1,} returns sandbox id \"eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197\"" Dec 13 14:49:57.662459 env[1768]: time="2024-12-13T14:49:57.662417077Z" level=info msg="CreateContainer within sandbox \"eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:49:57.714465 env[1768]: time="2024-12-13T14:49:57.714415659Z" level=info msg="CreateContainer within sandbox \"eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"00115ea9d2dce481a73d76646ad4da5103901a84a99191b9d35867147c24ff9e\"" Dec 13 14:49:57.716421 env[1768]: time="2024-12-13T14:49:57.716293651Z" level=info msg="StartContainer for \"00115ea9d2dce481a73d76646ad4da5103901a84a99191b9d35867147c24ff9e\"" Dec 13 14:49:57.765082 systemd[1]: Started cri-containerd-00115ea9d2dce481a73d76646ad4da5103901a84a99191b9d35867147c24ff9e.scope. Dec 13 14:49:57.782410 env[1768]: time="2024-12-13T14:49:57.782330204Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cbbfffd85-44tds,Uid:6051e298-e50c-4744-bd52-0b5ad22e6435,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5\"" Dec 13 14:49:57.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.797000 audit: BPF prog-id=182 op=LOAD Dec 13 14:49:57.800000 audit[4825]: AVC avc: denied { bpf } for pid=4825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.800000 audit[4825]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4723 pid=4825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:57.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030313135656139643264636534383161373364373636343661643464 Dec 13 14:49:57.800000 audit[4825]: AVC avc: denied { perfmon } for pid=4825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.800000 audit[4825]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4723 pid=4825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:57.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030313135656139643264636534383161373364373636343661643464 Dec 13 14:49:57.801000 audit[4825]: AVC avc: denied { bpf } for pid=4825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.801000 audit[4825]: AVC avc: denied { bpf } for pid=4825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.801000 audit[4825]: AVC avc: denied { bpf } for pid=4825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.801000 audit[4825]: AVC avc: denied { perfmon } for pid=4825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.801000 audit[4825]: AVC avc: denied { perfmon } for pid=4825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.801000 audit[4825]: AVC avc: denied { perfmon } for pid=4825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.801000 audit[4825]: AVC avc: denied { perfmon } for pid=4825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.801000 audit[4825]: AVC avc: denied { perfmon } for pid=4825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.801000 audit[4825]: AVC avc: denied { bpf } for pid=4825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.801000 audit[4825]: AVC avc: denied { bpf } for pid=4825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.801000 audit: BPF prog-id=183 op=LOAD Dec 13 14:49:57.801000 audit[4825]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00025bf00 items=0 ppid=4723 pid=4825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:57.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030313135656139643264636534383161373364373636343661643464 Dec 13 14:49:57.802000 audit[4825]: AVC avc: denied { bpf } for pid=4825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.802000 audit[4825]: AVC avc: denied { bpf } for pid=4825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.802000 audit[4825]: AVC avc: denied { perfmon } for pid=4825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.802000 audit[4825]: AVC avc: denied { perfmon } for pid=4825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.802000 audit[4825]: AVC avc: denied { perfmon } for pid=4825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.802000 audit[4825]: AVC avc: denied { perfmon } for pid=4825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.802000 audit[4825]: AVC avc: denied { perfmon } for pid=4825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.802000 audit[4825]: AVC avc: denied { bpf } for pid=4825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.802000 audit[4825]: AVC avc: denied { bpf } for pid=4825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.802000 audit: BPF prog-id=184 op=LOAD Dec 13 14:49:57.802000 audit[4825]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00025bf48 items=0 ppid=4723 pid=4825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:57.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030313135656139643264636534383161373364373636343661643464 Dec 13 14:49:57.803000 audit: BPF prog-id=184 op=UNLOAD Dec 13 14:49:57.804000 audit: BPF prog-id=183 op=UNLOAD Dec 13 14:49:57.804000 audit[4825]: AVC avc: denied { bpf } for pid=4825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.804000 audit[4825]: AVC avc: denied { bpf } for pid=4825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.804000 audit[4825]: AVC avc: denied { bpf } for pid=4825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.804000 audit[4825]: AVC avc: denied { perfmon } for pid=4825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.804000 audit[4825]: AVC avc: denied { perfmon } for pid=4825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.804000 audit[4825]: AVC avc: denied { perfmon } for pid=4825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.804000 audit[4825]: AVC avc: denied { perfmon } for pid=4825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.804000 audit[4825]: AVC avc: denied { perfmon } for pid=4825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.804000 audit[4825]: AVC avc: denied { bpf } for pid=4825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.804000 audit[4825]: AVC avc: denied { bpf } for pid=4825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:57.804000 audit: BPF prog-id=185 op=LOAD Dec 13 14:49:57.804000 audit[4825]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000328358 items=0 ppid=4723 pid=4825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:57.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030313135656139643264636534383161373364373636343661643464 Dec 13 14:49:57.884119 env[1768]: time="2024-12-13T14:49:57.884061472Z" level=info msg="StartContainer for \"00115ea9d2dce481a73d76646ad4da5103901a84a99191b9d35867147c24ff9e\" returns successfully" Dec 13 14:49:57.916655 env[1768]: 2024-12-13 14:49:57.726 [INFO][4801] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" Dec 13 14:49:57.916655 env[1768]: 2024-12-13 14:49:57.726 [INFO][4801] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" iface="eth0" netns="/var/run/netns/cni-380d144f-4f86-729c-600b-63f56e848cf7" Dec 13 14:49:57.916655 env[1768]: 2024-12-13 14:49:57.726 [INFO][4801] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" iface="eth0" netns="/var/run/netns/cni-380d144f-4f86-729c-600b-63f56e848cf7" Dec 13 14:49:57.916655 env[1768]: 2024-12-13 14:49:57.727 [INFO][4801] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" iface="eth0" netns="/var/run/netns/cni-380d144f-4f86-729c-600b-63f56e848cf7" Dec 13 14:49:57.916655 env[1768]: 2024-12-13 14:49:57.727 [INFO][4801] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" Dec 13 14:49:57.916655 env[1768]: 2024-12-13 14:49:57.727 [INFO][4801] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" Dec 13 14:49:57.916655 env[1768]: 2024-12-13 14:49:57.876 [INFO][4814] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" HandleID="k8s-pod-network.7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" Workload="ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0" Dec 13 14:49:57.916655 env[1768]: 2024-12-13 14:49:57.877 [INFO][4814] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:49:57.916655 env[1768]: 2024-12-13 14:49:57.877 [INFO][4814] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:49:57.916655 env[1768]: 2024-12-13 14:49:57.896 [WARNING][4814] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" HandleID="k8s-pod-network.7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" Workload="ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0" Dec 13 14:49:57.916655 env[1768]: 2024-12-13 14:49:57.896 [INFO][4814] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" HandleID="k8s-pod-network.7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" Workload="ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0" Dec 13 14:49:57.916655 env[1768]: 2024-12-13 14:49:57.903 [INFO][4814] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:49:57.916655 env[1768]: 2024-12-13 14:49:57.906 [INFO][4801] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" Dec 13 14:49:57.917555 env[1768]: time="2024-12-13T14:49:57.917516636Z" level=info msg="TearDown network for sandbox \"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f\" successfully" Dec 13 14:49:57.917669 env[1768]: time="2024-12-13T14:49:57.917648670Z" level=info msg="StopPodSandbox for \"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f\" returns successfully" Dec 13 14:49:57.923107 env[1768]: time="2024-12-13T14:49:57.923068950Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8476d774b7-cdj8q,Uid:8fd2a2a6-7426-4b36-a158-0c72069bd492,Namespace:calico-system,Attempt:1,}" Dec 13 14:49:58.000503 systemd[1]: run-netns-cni\x2d380d144f\x2d4f86\x2d729c\x2d600b\x2d63f56e848cf7.mount: Deactivated successfully. Dec 13 14:49:58.227444 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:49:58.227682 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali726a98bc1e8: link becomes ready Dec 13 14:49:58.224059 systemd-networkd[1461]: cali726a98bc1e8: Link UP Dec 13 14:49:58.231177 systemd-networkd[1461]: cali726a98bc1e8: Gained carrier Dec 13 14:49:58.257896 env[1768]: 2024-12-13 14:49:58.088 [INFO][4861] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0 calico-kube-controllers-8476d774b7- calico-system 8fd2a2a6-7426-4b36-a158-0c72069bd492 791 0 2024-12-13 14:49:28 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:8476d774b7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-25-13 calico-kube-controllers-8476d774b7-cdj8q eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali726a98bc1e8 [] []}} ContainerID="996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968" Namespace="calico-system" Pod="calico-kube-controllers-8476d774b7-cdj8q" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-" Dec 13 14:49:58.257896 env[1768]: 2024-12-13 14:49:58.089 [INFO][4861] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968" Namespace="calico-system" Pod="calico-kube-controllers-8476d774b7-cdj8q" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0" Dec 13 14:49:58.257896 env[1768]: 2024-12-13 14:49:58.147 [INFO][4872] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968" HandleID="k8s-pod-network.996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968" Workload="ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0" Dec 13 14:49:58.257896 env[1768]: 2024-12-13 14:49:58.164 [INFO][4872] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968" HandleID="k8s-pod-network.996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968" Workload="ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000308810), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-25-13", "pod":"calico-kube-controllers-8476d774b7-cdj8q", "timestamp":"2024-12-13 14:49:58.147775716 +0000 UTC"}, Hostname:"ip-172-31-25-13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:49:58.257896 env[1768]: 2024-12-13 14:49:58.164 [INFO][4872] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:49:58.257896 env[1768]: 2024-12-13 14:49:58.164 [INFO][4872] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:49:58.257896 env[1768]: 2024-12-13 14:49:58.164 [INFO][4872] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-25-13' Dec 13 14:49:58.257896 env[1768]: 2024-12-13 14:49:58.167 [INFO][4872] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968" host="ip-172-31-25-13" Dec 13 14:49:58.257896 env[1768]: 2024-12-13 14:49:58.177 [INFO][4872] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-25-13" Dec 13 14:49:58.257896 env[1768]: 2024-12-13 14:49:58.186 [INFO][4872] ipam/ipam.go 489: Trying affinity for 192.168.73.0/26 host="ip-172-31-25-13" Dec 13 14:49:58.257896 env[1768]: 2024-12-13 14:49:58.189 [INFO][4872] ipam/ipam.go 155: Attempting to load block cidr=192.168.73.0/26 host="ip-172-31-25-13" Dec 13 14:49:58.257896 env[1768]: 2024-12-13 14:49:58.193 [INFO][4872] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.73.0/26 host="ip-172-31-25-13" Dec 13 14:49:58.257896 env[1768]: 2024-12-13 14:49:58.193 [INFO][4872] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.73.0/26 handle="k8s-pod-network.996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968" host="ip-172-31-25-13" Dec 13 14:49:58.257896 env[1768]: 2024-12-13 14:49:58.196 [INFO][4872] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968 Dec 13 14:49:58.257896 env[1768]: 2024-12-13 14:49:58.204 [INFO][4872] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.73.0/26 handle="k8s-pod-network.996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968" host="ip-172-31-25-13" Dec 13 14:49:58.257896 env[1768]: 2024-12-13 14:49:58.217 [INFO][4872] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.73.6/26] block=192.168.73.0/26 handle="k8s-pod-network.996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968" host="ip-172-31-25-13" Dec 13 14:49:58.257896 env[1768]: 2024-12-13 14:49:58.217 [INFO][4872] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.73.6/26] handle="k8s-pod-network.996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968" host="ip-172-31-25-13" Dec 13 14:49:58.257896 env[1768]: 2024-12-13 14:49:58.217 [INFO][4872] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:49:58.257896 env[1768]: 2024-12-13 14:49:58.217 [INFO][4872] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.73.6/26] IPv6=[] ContainerID="996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968" HandleID="k8s-pod-network.996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968" Workload="ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0" Dec 13 14:49:58.259802 env[1768]: 2024-12-13 14:49:58.220 [INFO][4861] cni-plugin/k8s.go 386: Populated endpoint ContainerID="996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968" Namespace="calico-system" Pod="calico-kube-controllers-8476d774b7-cdj8q" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0", GenerateName:"calico-kube-controllers-8476d774b7-", Namespace:"calico-system", SelfLink:"", UID:"8fd2a2a6-7426-4b36-a158-0c72069bd492", ResourceVersion:"791", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8476d774b7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"", Pod:"calico-kube-controllers-8476d774b7-cdj8q", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.73.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali726a98bc1e8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:49:58.259802 env[1768]: 2024-12-13 14:49:58.220 [INFO][4861] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.73.6/32] ContainerID="996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968" Namespace="calico-system" Pod="calico-kube-controllers-8476d774b7-cdj8q" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0" Dec 13 14:49:58.259802 env[1768]: 2024-12-13 14:49:58.220 [INFO][4861] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali726a98bc1e8 ContainerID="996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968" Namespace="calico-system" Pod="calico-kube-controllers-8476d774b7-cdj8q" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0" Dec 13 14:49:58.259802 env[1768]: 2024-12-13 14:49:58.232 [INFO][4861] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968" Namespace="calico-system" Pod="calico-kube-controllers-8476d774b7-cdj8q" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0" Dec 13 14:49:58.259802 env[1768]: 2024-12-13 14:49:58.232 [INFO][4861] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968" Namespace="calico-system" Pod="calico-kube-controllers-8476d774b7-cdj8q" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0", GenerateName:"calico-kube-controllers-8476d774b7-", Namespace:"calico-system", SelfLink:"", UID:"8fd2a2a6-7426-4b36-a158-0c72069bd492", ResourceVersion:"791", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8476d774b7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968", Pod:"calico-kube-controllers-8476d774b7-cdj8q", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.73.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali726a98bc1e8", MAC:"42:70:4e:d5:e8:37", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:49:58.259802 env[1768]: 2024-12-13 14:49:58.254 [INFO][4861] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968" Namespace="calico-system" Pod="calico-kube-controllers-8476d774b7-cdj8q" WorkloadEndpoint="ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0" Dec 13 14:49:58.295000 audit[4888]: NETFILTER_CFG table=filter:110 family=2 entries=50 op=nft_register_chain pid=4888 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:49:58.295000 audit[4888]: SYSCALL arch=c000003e syscall=46 success=yes exit=23392 a0=3 a1=7ffefbdaccb0 a2=0 a3=7ffefbdacc9c items=0 ppid=4062 pid=4888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:58.295000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:49:58.332929 env[1768]: time="2024-12-13T14:49:58.332856781Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:49:58.333241 env[1768]: time="2024-12-13T14:49:58.333206862Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:49:58.333453 env[1768]: time="2024-12-13T14:49:58.333370870Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:49:58.335335 env[1768]: time="2024-12-13T14:49:58.335148733Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968 pid=4899 runtime=io.containerd.runc.v2 Dec 13 14:49:58.374543 systemd[1]: Started cri-containerd-996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968.scope. Dec 13 14:49:58.397098 systemd-networkd[1461]: cali173cd2fa4c4: Gained IPv6LL Dec 13 14:49:58.482895 systemd-networkd[1461]: cali0e94f89924b: Gained IPv6LL Dec 13 14:49:58.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.501000 audit: BPF prog-id=186 op=LOAD Dec 13 14:49:58.504000 audit[4909]: AVC avc: denied { bpf } for pid=4909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.504000 audit[4909]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4899 pid=4909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:58.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939363436386365616665333366323166653336663334353234663735 Dec 13 14:49:58.505000 audit[4909]: AVC avc: denied { perfmon } for pid=4909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.505000 audit[4909]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4899 pid=4909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:58.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939363436386365616665333366323166653336663334353234663735 Dec 13 14:49:58.505000 audit[4909]: AVC avc: denied { bpf } for pid=4909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.505000 audit[4909]: AVC avc: denied { bpf } for pid=4909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.505000 audit[4909]: AVC avc: denied { bpf } for pid=4909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.505000 audit[4909]: AVC avc: denied { perfmon } for pid=4909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.505000 audit[4909]: AVC avc: denied { perfmon } for pid=4909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.505000 audit[4909]: AVC avc: denied { perfmon } for pid=4909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.505000 audit[4909]: AVC avc: denied { perfmon } for pid=4909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.505000 audit[4909]: AVC avc: denied { perfmon } for pid=4909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.505000 audit[4909]: AVC avc: denied { bpf } for pid=4909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.505000 audit[4909]: AVC avc: denied { bpf } for pid=4909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.505000 audit: BPF prog-id=187 op=LOAD Dec 13 14:49:58.505000 audit[4909]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003e69d0 items=0 ppid=4899 pid=4909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:58.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939363436386365616665333366323166653336663334353234663735 Dec 13 14:49:58.508000 audit[4909]: AVC avc: denied { bpf } for pid=4909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.508000 audit[4909]: AVC avc: denied { bpf } for pid=4909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.508000 audit[4909]: AVC avc: denied { perfmon } for pid=4909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.508000 audit[4909]: AVC avc: denied { perfmon } for pid=4909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.508000 audit[4909]: AVC avc: denied { perfmon } for pid=4909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.508000 audit[4909]: AVC avc: denied { perfmon } for pid=4909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.508000 audit[4909]: AVC avc: denied { perfmon } for pid=4909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.508000 audit[4909]: AVC avc: denied { bpf } for pid=4909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.508000 audit[4909]: AVC avc: denied { bpf } for pid=4909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.508000 audit: BPF prog-id=188 op=LOAD Dec 13 14:49:58.508000 audit[4909]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003e6a18 items=0 ppid=4899 pid=4909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:58.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939363436386365616665333366323166653336663334353234663735 Dec 13 14:49:58.508000 audit: BPF prog-id=188 op=UNLOAD Dec 13 14:49:58.508000 audit: BPF prog-id=187 op=UNLOAD Dec 13 14:49:58.508000 audit[4909]: AVC avc: denied { bpf } for pid=4909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.508000 audit[4909]: AVC avc: denied { bpf } for pid=4909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.508000 audit[4909]: AVC avc: denied { bpf } for pid=4909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.508000 audit[4909]: AVC avc: denied { perfmon } for pid=4909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.508000 audit[4909]: AVC avc: denied { perfmon } for pid=4909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.508000 audit[4909]: AVC avc: denied { perfmon } for pid=4909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.508000 audit[4909]: AVC avc: denied { perfmon } for pid=4909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.508000 audit[4909]: AVC avc: denied { perfmon } for pid=4909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.508000 audit[4909]: AVC avc: denied { bpf } for pid=4909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.508000 audit[4909]: AVC avc: denied { bpf } for pid=4909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:58.508000 audit: BPF prog-id=189 op=LOAD Dec 13 14:49:58.508000 audit[4909]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003e6e28 items=0 ppid=4899 pid=4909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:58.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939363436386365616665333366323166653336663334353234663735 Dec 13 14:49:58.625712 env[1768]: time="2024-12-13T14:49:58.625664973Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8476d774b7-cdj8q,Uid:8fd2a2a6-7426-4b36-a158-0c72069bd492,Namespace:calico-system,Attempt:1,} returns sandbox id \"996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968\"" Dec 13 14:49:58.827114 kubelet[2628]: I1213 14:49:58.826645 2628 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-6rqpd" podStartSLOduration=40.826623359 podStartE2EDuration="40.826623359s" podCreationTimestamp="2024-12-13 14:49:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:49:58.823927236 +0000 UTC m=+45.610385160" watchObservedRunningTime="2024-12-13 14:49:58.826623359 +0000 UTC m=+45.613081284" Dec 13 14:49:58.901000 audit[4935]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4935 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:49:58.901000 audit[4935]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff730ea160 a2=0 a3=7fff730ea14c items=0 ppid=3063 pid=4935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:58.901000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:58.909000 audit[4935]: NETFILTER_CFG table=nat:112 family=2 entries=44 op=nft_register_rule pid=4935 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:49:58.909000 audit[4935]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff730ea160 a2=0 a3=7fff730ea14c items=0 ppid=3063 pid=4935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:58.909000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:58.930000 audit[4937]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4937 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:49:58.930000 audit[4937]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffedfa6cdb0 a2=0 a3=7ffedfa6cd9c items=0 ppid=3063 pid=4937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:58.930000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:58.951000 audit[4937]: NETFILTER_CFG table=nat:114 family=2 entries=56 op=nft_register_chain pid=4937 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:49:58.951000 audit[4937]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffedfa6cdb0 a2=0 a3=7ffedfa6cd9c items=0 ppid=3063 pid=4937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:58.951000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:59.499930 env[1768]: time="2024-12-13T14:49:59.499887435Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:59.510811 env[1768]: time="2024-12-13T14:49:59.510767236Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:59.517658 env[1768]: time="2024-12-13T14:49:59.517602261Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:59.527475 env[1768]: time="2024-12-13T14:49:59.527434059Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:49:59.527939 env[1768]: time="2024-12-13T14:49:59.527889537Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:49:59.534992 env[1768]: time="2024-12-13T14:49:59.534178214Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:49:59.539328 env[1768]: time="2024-12-13T14:49:59.539233356Z" level=info msg="CreateContainer within sandbox \"b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:49:59.594107 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2571986597.mount: Deactivated successfully. Dec 13 14:49:59.618250 env[1768]: time="2024-12-13T14:49:59.618150595Z" level=info msg="CreateContainer within sandbox \"b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"182a29cd287ecc1cebf53af940055f67a9215ea9f00d5e77cb54402043b6160c\"" Dec 13 14:49:59.622793 env[1768]: time="2024-12-13T14:49:59.622754740Z" level=info msg="StartContainer for \"182a29cd287ecc1cebf53af940055f67a9215ea9f00d5e77cb54402043b6160c\"" Dec 13 14:49:59.654444 systemd[1]: run-containerd-runc-k8s.io-182a29cd287ecc1cebf53af940055f67a9215ea9f00d5e77cb54402043b6160c-runc.aKuCAW.mount: Deactivated successfully. Dec 13 14:49:59.661601 systemd[1]: Started cri-containerd-182a29cd287ecc1cebf53af940055f67a9215ea9f00d5e77cb54402043b6160c.scope. Dec 13 14:49:59.686405 kernel: kauditd_printk_skb: 428 callbacks suppressed Dec 13 14:49:59.686537 kernel: audit: type=1400 audit(1734101399.682:1273): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.686576 kernel: audit: type=1400 audit(1734101399.682:1274): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.692809 kernel: audit: type=1400 audit(1734101399.682:1275): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.692898 kernel: audit: type=1400 audit(1734101399.682:1276): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.696299 kernel: audit: type=1400 audit(1734101399.682:1277): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.702833 kernel: audit: type=1400 audit(1734101399.682:1278): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.706143 kernel: audit: type=1400 audit(1734101399.682:1279): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.713189 kernel: audit: type=1400 audit(1734101399.682:1280): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.713277 kernel: audit: type=1400 audit(1734101399.682:1281): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.689000 audit: BPF prog-id=190 op=LOAD Dec 13 14:49:59.689000 audit[4948]: AVC avc: denied { bpf } for pid=4948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.689000 audit[4948]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4440 pid=4948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:59.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138326132396364323837656363316365626635336166393430303535 Dec 13 14:49:59.689000 audit[4948]: AVC avc: denied { perfmon } for pid=4948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.689000 audit[4948]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4440 pid=4948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:59.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138326132396364323837656363316365626635336166393430303535 Dec 13 14:49:59.717291 kernel: audit: type=1400 audit(1734101399.689:1282): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.689000 audit[4948]: AVC avc: denied { bpf } for pid=4948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.689000 audit[4948]: AVC avc: denied { bpf } for pid=4948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.689000 audit[4948]: AVC avc: denied { bpf } for pid=4948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.689000 audit[4948]: AVC avc: denied { perfmon } for pid=4948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.689000 audit[4948]: AVC avc: denied { perfmon } for pid=4948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.689000 audit[4948]: AVC avc: denied { perfmon } for pid=4948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.689000 audit[4948]: AVC avc: denied { perfmon } for pid=4948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.689000 audit[4948]: AVC avc: denied { perfmon } for pid=4948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.689000 audit[4948]: AVC avc: denied { bpf } for pid=4948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.689000 audit[4948]: AVC avc: denied { bpf } for pid=4948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.689000 audit: BPF prog-id=191 op=LOAD Dec 13 14:49:59.689000 audit[4948]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003a88d0 items=0 ppid=4440 pid=4948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:59.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138326132396364323837656363316365626635336166393430303535 Dec 13 14:49:59.699000 audit[4948]: AVC avc: denied { bpf } for pid=4948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.699000 audit[4948]: AVC avc: denied { bpf } for pid=4948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.699000 audit[4948]: AVC avc: denied { perfmon } for pid=4948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.699000 audit[4948]: AVC avc: denied { perfmon } for pid=4948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.699000 audit[4948]: AVC avc: denied { perfmon } for pid=4948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.699000 audit[4948]: AVC avc: denied { perfmon } for pid=4948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.699000 audit[4948]: AVC avc: denied { perfmon } for pid=4948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.699000 audit[4948]: AVC avc: denied { bpf } for pid=4948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.699000 audit[4948]: AVC avc: denied { bpf } for pid=4948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.699000 audit: BPF prog-id=192 op=LOAD Dec 13 14:49:59.699000 audit[4948]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003a8918 items=0 ppid=4440 pid=4948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:59.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138326132396364323837656363316365626635336166393430303535 Dec 13 14:49:59.702000 audit: BPF prog-id=192 op=UNLOAD Dec 13 14:49:59.702000 audit: BPF prog-id=191 op=UNLOAD Dec 13 14:49:59.702000 audit[4948]: AVC avc: denied { bpf } for pid=4948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.702000 audit[4948]: AVC avc: denied { bpf } for pid=4948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.702000 audit[4948]: AVC avc: denied { bpf } for pid=4948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.702000 audit[4948]: AVC avc: denied { perfmon } for pid=4948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.702000 audit[4948]: AVC avc: denied { perfmon } for pid=4948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.702000 audit[4948]: AVC avc: denied { perfmon } for pid=4948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.702000 audit[4948]: AVC avc: denied { perfmon } for pid=4948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.702000 audit[4948]: AVC avc: denied { perfmon } for pid=4948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.702000 audit[4948]: AVC avc: denied { bpf } for pid=4948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.702000 audit[4948]: AVC avc: denied { bpf } for pid=4948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:49:59.702000 audit: BPF prog-id=193 op=LOAD Dec 13 14:49:59.702000 audit[4948]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003a8d28 items=0 ppid=4440 pid=4948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:59.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138326132396364323837656363316365626635336166393430303535 Dec 13 14:49:59.738475 systemd-networkd[1461]: cali726a98bc1e8: Gained IPv6LL Dec 13 14:49:59.765576 env[1768]: time="2024-12-13T14:49:59.765479632Z" level=info msg="StartContainer for \"182a29cd287ecc1cebf53af940055f67a9215ea9f00d5e77cb54402043b6160c\" returns successfully" Dec 13 14:49:59.990000 audit[4979]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4979 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:49:59.990000 audit[4979]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffdf686e0c0 a2=0 a3=7ffdf686e0ac items=0 ppid=3063 pid=4979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:59.990000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:49:59.996000 audit[4979]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4979 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:49:59.996000 audit[4979]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdf686e0c0 a2=0 a3=7ffdf686e0ac items=0 ppid=3063 pid=4979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:49:59.996000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:50:00.809888 kubelet[2628]: I1213 14:50:00.809859 2628 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:50:01.250000 audit[4959]: AVC avc: denied { watch } for pid=4959 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_49_40.2120180835/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c443,c1017 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c443,c1017 tclass=file permissive=0 Dec 13 14:50:01.250000 audit[4959]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000df0de0 a2=fc6 a3=0 items=0 ppid=4440 pid=4959 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c443,c1017 key=(null) Dec 13 14:50:01.250000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:50:02.252627 env[1768]: time="2024-12-13T14:50:02.252536561Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:02.256295 env[1768]: time="2024-12-13T14:50:02.256227475Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:02.258990 env[1768]: time="2024-12-13T14:50:02.258949026Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:02.261370 env[1768]: time="2024-12-13T14:50:02.261329675Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:02.261984 env[1768]: time="2024-12-13T14:50:02.261946328Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:50:02.266220 env[1768]: time="2024-12-13T14:50:02.265400321Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:50:02.276952 env[1768]: time="2024-12-13T14:50:02.276911589Z" level=info msg="CreateContainer within sandbox \"833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:50:02.309026 env[1768]: time="2024-12-13T14:50:02.308972254Z" level=info msg="CreateContainer within sandbox \"833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"e4f640afb3e94d176511fb9e5aaac8a11edd87cb915dc04e4bd718e30f9838df\"" Dec 13 14:50:02.311910 env[1768]: time="2024-12-13T14:50:02.310230013Z" level=info msg="StartContainer for \"e4f640afb3e94d176511fb9e5aaac8a11edd87cb915dc04e4bd718e30f9838df\"" Dec 13 14:50:02.353050 systemd[1]: run-containerd-runc-k8s.io-e4f640afb3e94d176511fb9e5aaac8a11edd87cb915dc04e4bd718e30f9838df-runc.u8mBWv.mount: Deactivated successfully. Dec 13 14:50:02.365306 systemd[1]: Started cri-containerd-e4f640afb3e94d176511fb9e5aaac8a11edd87cb915dc04e4bd718e30f9838df.scope. Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f058c058828 items=0 ppid=4549 pid=4988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:02.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534663634306166623365393464313736353131666239653561616163 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit: BPF prog-id=194 op=LOAD Dec 13 14:50:02.408000 audit[4988]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000338c38 items=0 ppid=4549 pid=4988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:02.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534663634306166623365393464313736353131666239653561616163 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit: BPF prog-id=195 op=LOAD Dec 13 14:50:02.408000 audit[4988]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000338c88 items=0 ppid=4549 pid=4988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:02.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534663634306166623365393464313736353131666239653561616163 Dec 13 14:50:02.408000 audit: BPF prog-id=195 op=UNLOAD Dec 13 14:50:02.408000 audit: BPF prog-id=194 op=UNLOAD Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.408000 audit: BPF prog-id=196 op=LOAD Dec 13 14:50:02.408000 audit[4988]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000338d18 items=0 ppid=4549 pid=4988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:02.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534663634306166623365393464313736353131666239653561616163 Dec 13 14:50:02.461281 env[1768]: time="2024-12-13T14:50:02.458232323Z" level=info msg="StartContainer for \"e4f640afb3e94d176511fb9e5aaac8a11edd87cb915dc04e4bd718e30f9838df\" returns successfully" Dec 13 14:50:02.759736 env[1768]: time="2024-12-13T14:50:02.759688097Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:02.764822 env[1768]: time="2024-12-13T14:50:02.764743646Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:02.767231 env[1768]: time="2024-12-13T14:50:02.767196654Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:02.770318 env[1768]: time="2024-12-13T14:50:02.770283633Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:02.770835 env[1768]: time="2024-12-13T14:50:02.770800834Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:50:02.772809 env[1768]: time="2024-12-13T14:50:02.772781975Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:50:02.779205 env[1768]: time="2024-12-13T14:50:02.779164792Z" level=info msg="CreateContainer within sandbox \"61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:50:02.807032 env[1768]: time="2024-12-13T14:50:02.806986545Z" level=info msg="CreateContainer within sandbox \"61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"77ca9a85fbc8c8b07ad5eb1ece44c1b5a4ab3d666276e36b2a43da0c7e420b84\"" Dec 13 14:50:02.808816 env[1768]: time="2024-12-13T14:50:02.808679456Z" level=info msg="StartContainer for \"77ca9a85fbc8c8b07ad5eb1ece44c1b5a4ab3d666276e36b2a43da0c7e420b84\"" Dec 13 14:50:02.838611 systemd[1]: Started cri-containerd-77ca9a85fbc8c8b07ad5eb1ece44c1b5a4ab3d666276e36b2a43da0c7e420b84.scope. Dec 13 14:50:02.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.863000 audit: BPF prog-id=197 op=LOAD Dec 13 14:50:02.863000 audit[5026]: AVC avc: denied { bpf } for pid=5026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.863000 audit[5026]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4738 pid=5026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:02.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737636139613835666263386338623037616435656231656365343463 Dec 13 14:50:02.863000 audit[5026]: AVC avc: denied { perfmon } for pid=5026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.863000 audit[5026]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4738 pid=5026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:02.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737636139613835666263386338623037616435656231656365343463 Dec 13 14:50:02.863000 audit[5026]: AVC avc: denied { bpf } for pid=5026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.863000 audit[5026]: AVC avc: denied { bpf } for pid=5026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.863000 audit[5026]: AVC avc: denied { bpf } for pid=5026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.863000 audit[5026]: AVC avc: denied { perfmon } for pid=5026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.863000 audit[5026]: AVC avc: denied { perfmon } for pid=5026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.863000 audit[5026]: AVC avc: denied { perfmon } for pid=5026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.863000 audit[5026]: AVC avc: denied { perfmon } for pid=5026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.863000 audit[5026]: AVC avc: denied { perfmon } for pid=5026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.863000 audit[5026]: AVC avc: denied { bpf } for pid=5026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.863000 audit[5026]: AVC avc: denied { bpf } for pid=5026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.863000 audit: BPF prog-id=198 op=LOAD Dec 13 14:50:02.863000 audit[5026]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00025f930 items=0 ppid=4738 pid=5026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:02.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737636139613835666263386338623037616435656231656365343463 Dec 13 14:50:02.864000 audit[5026]: AVC avc: denied { bpf } for pid=5026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.864000 audit[5026]: AVC avc: denied { bpf } for pid=5026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.864000 audit[5026]: AVC avc: denied { perfmon } for pid=5026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.864000 audit[5026]: AVC avc: denied { perfmon } for pid=5026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.864000 audit[5026]: AVC avc: denied { perfmon } for pid=5026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.864000 audit[5026]: AVC avc: denied { perfmon } for pid=5026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.864000 audit[5026]: AVC avc: denied { perfmon } for pid=5026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.864000 audit[5026]: AVC avc: denied { bpf } for pid=5026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.864000 audit[5026]: AVC avc: denied { bpf } for pid=5026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.864000 audit: BPF prog-id=199 op=LOAD Dec 13 14:50:02.864000 audit[5026]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00025f978 items=0 ppid=4738 pid=5026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:02.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737636139613835666263386338623037616435656231656365343463 Dec 13 14:50:02.864000 audit: BPF prog-id=199 op=UNLOAD Dec 13 14:50:02.864000 audit: BPF prog-id=198 op=UNLOAD Dec 13 14:50:02.864000 audit[5026]: AVC avc: denied { bpf } for pid=5026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.864000 audit[5026]: AVC avc: denied { bpf } for pid=5026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.864000 audit[5026]: AVC avc: denied { bpf } for pid=5026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.864000 audit[5026]: AVC avc: denied { perfmon } for pid=5026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.864000 audit[5026]: AVC avc: denied { perfmon } for pid=5026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.864000 audit[5026]: AVC avc: denied { perfmon } for pid=5026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.864000 audit[5026]: AVC avc: denied { perfmon } for pid=5026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.864000 audit[5026]: AVC avc: denied { perfmon } for pid=5026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.864000 audit[5026]: AVC avc: denied { bpf } for pid=5026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.864000 audit[5026]: AVC avc: denied { bpf } for pid=5026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:02.864000 audit: BPF prog-id=200 op=LOAD Dec 13 14:50:02.864000 audit[5026]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00025fd88 items=0 ppid=4738 pid=5026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:02.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737636139613835666263386338623037616435656231656365343463 Dec 13 14:50:02.909477 env[1768]: time="2024-12-13T14:50:02.909424541Z" level=info msg="StartContainer for \"77ca9a85fbc8c8b07ad5eb1ece44c1b5a4ab3d666276e36b2a43da0c7e420b84\" returns successfully" Dec 13 14:50:03.847460 kubelet[2628]: I1213 14:50:03.847365 2628 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5cbbfffd85-44tds" podStartSLOduration=30.861760822 podStartE2EDuration="35.847328686s" podCreationTimestamp="2024-12-13 14:49:28 +0000 UTC" firstStartedPulling="2024-12-13 14:49:57.786660204 +0000 UTC m=+44.573118111" lastFinishedPulling="2024-12-13 14:50:02.772228001 +0000 UTC m=+49.558685975" observedRunningTime="2024-12-13 14:50:03.840169725 +0000 UTC m=+50.626627652" watchObservedRunningTime="2024-12-13 14:50:03.847328686 +0000 UTC m=+50.633786611" Dec 13 14:50:03.848076 kubelet[2628]: I1213 14:50:03.847515 2628 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5cbbfffd85-dl4wj" podStartSLOduration=31.406644567 podStartE2EDuration="35.847492062s" podCreationTimestamp="2024-12-13 14:49:28 +0000 UTC" firstStartedPulling="2024-12-13 14:49:55.092283005 +0000 UTC m=+41.878740912" lastFinishedPulling="2024-12-13 14:49:59.533130502 +0000 UTC m=+46.319588407" observedRunningTime="2024-12-13 14:49:59.828435439 +0000 UTC m=+46.614893366" watchObservedRunningTime="2024-12-13 14:50:03.847492062 +0000 UTC m=+50.633949986" Dec 13 14:50:03.895000 audit[5059]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=5059 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:50:03.895000 audit[5059]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe3aef0670 a2=0 a3=7ffe3aef065c items=0 ppid=3063 pid=5059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:03.895000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:50:03.901000 audit[5059]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=5059 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:50:03.901000 audit[5059]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe3aef0670 a2=0 a3=7ffe3aef065c items=0 ppid=3063 pid=5059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:03.901000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:50:04.171000 audit[5037]: AVC avc: denied { watch } for pid=5037 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_49_40.3496681955/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c791 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c122,c791 tclass=file permissive=0 Dec 13 14:50:04.171000 audit[5037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0002cc3a0 a2=fc6 a3=0 items=0 ppid=4738 pid=5037 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c791 key=(null) Dec 13 14:50:04.171000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:50:04.252000 audit[5061]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=5061 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:50:04.252000 audit[5061]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe409e79b0 a2=0 a3=7ffe409e799c items=0 ppid=3063 pid=5061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:04.252000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:50:04.257000 audit[5061]: NETFILTER_CFG table=nat:120 family=2 entries=27 op=nft_register_chain pid=5061 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:50:04.257000 audit[5061]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe409e79b0 a2=0 a3=7ffe409e799c items=0 ppid=3063 pid=5061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:04.257000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:50:05.993559 env[1768]: time="2024-12-13T14:50:05.993514387Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:05.998135 env[1768]: time="2024-12-13T14:50:05.998096337Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:06.000346 env[1768]: time="2024-12-13T14:50:06.000317024Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:06.002875 env[1768]: time="2024-12-13T14:50:06.002848714Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:06.003397 env[1768]: time="2024-12-13T14:50:06.003365017Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 14:50:06.004775 env[1768]: time="2024-12-13T14:50:06.004725843Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:50:06.043694 env[1768]: time="2024-12-13T14:50:06.043655040Z" level=info msg="CreateContainer within sandbox \"996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:50:06.072688 env[1768]: time="2024-12-13T14:50:06.072621001Z" level=info msg="CreateContainer within sandbox \"996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"1d0d16a6032d31fdf7db0e7ce18f5b77389b5f2cda9c7c91eef3bd069644aa2a\"" Dec 13 14:50:06.074531 env[1768]: time="2024-12-13T14:50:06.074501978Z" level=info msg="StartContainer for \"1d0d16a6032d31fdf7db0e7ce18f5b77389b5f2cda9c7c91eef3bd069644aa2a\"" Dec 13 14:50:06.114334 systemd[1]: Started cri-containerd-1d0d16a6032d31fdf7db0e7ce18f5b77389b5f2cda9c7c91eef3bd069644aa2a.scope. Dec 13 14:50:06.138911 kernel: kauditd_printk_skb: 171 callbacks suppressed Dec 13 14:50:06.139097 kernel: audit: type=1400 audit(1734101406.131:1323): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.147911 kernel: audit: type=1400 audit(1734101406.131:1324): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.148029 kernel: audit: type=1400 audit(1734101406.131:1325): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.152321 kernel: audit: type=1400 audit(1734101406.131:1326): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.157313 kernel: audit: type=1400 audit(1734101406.131:1327): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.157438 kernel: audit: type=1400 audit(1734101406.131:1328): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.163980 kernel: audit: type=1400 audit(1734101406.131:1329): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.164066 kernel: audit: type=1400 audit(1734101406.131:1330): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.167511 kernel: audit: type=1400 audit(1734101406.131:1331): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.174434 kernel: audit: type=1400 audit(1734101406.137:1332): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.137000 audit: BPF prog-id=201 op=LOAD Dec 13 14:50:06.138000 audit[5071]: AVC avc: denied { bpf } for pid=5071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.138000 audit[5071]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4899 pid=5071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:06.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164306431366136303332643331666466376462306537636531386635 Dec 13 14:50:06.139000 audit[5071]: AVC avc: denied { perfmon } for pid=5071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.139000 audit[5071]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4899 pid=5071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:06.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164306431366136303332643331666466376462306537636531386635 Dec 13 14:50:06.139000 audit[5071]: AVC avc: denied { bpf } for pid=5071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.139000 audit[5071]: AVC avc: denied { bpf } for pid=5071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.139000 audit[5071]: AVC avc: denied { bpf } for pid=5071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.139000 audit[5071]: AVC avc: denied { perfmon } for pid=5071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.139000 audit[5071]: AVC avc: denied { perfmon } for pid=5071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.139000 audit[5071]: AVC avc: denied { perfmon } for pid=5071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.139000 audit[5071]: AVC avc: denied { perfmon } for pid=5071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.139000 audit[5071]: AVC avc: denied { perfmon } for pid=5071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.139000 audit[5071]: AVC avc: denied { bpf } for pid=5071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.139000 audit[5071]: AVC avc: denied { bpf } for pid=5071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.139000 audit: BPF prog-id=202 op=LOAD Dec 13 14:50:06.139000 audit[5071]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028b1e0 items=0 ppid=4899 pid=5071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:06.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164306431366136303332643331666466376462306537636531386635 Dec 13 14:50:06.139000 audit[5071]: AVC avc: denied { bpf } for pid=5071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.139000 audit[5071]: AVC avc: denied { bpf } for pid=5071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.139000 audit[5071]: AVC avc: denied { perfmon } for pid=5071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.139000 audit[5071]: AVC avc: denied { perfmon } for pid=5071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.139000 audit[5071]: AVC avc: denied { perfmon } for pid=5071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.139000 audit[5071]: AVC avc: denied { perfmon } for pid=5071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.139000 audit[5071]: AVC avc: denied { perfmon } for pid=5071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.139000 audit[5071]: AVC avc: denied { bpf } for pid=5071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.139000 audit[5071]: AVC avc: denied { bpf } for pid=5071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.139000 audit: BPF prog-id=203 op=LOAD Dec 13 14:50:06.139000 audit[5071]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028b228 items=0 ppid=4899 pid=5071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:06.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164306431366136303332643331666466376462306537636531386635 Dec 13 14:50:06.143000 audit: BPF prog-id=203 op=UNLOAD Dec 13 14:50:06.143000 audit: BPF prog-id=202 op=UNLOAD Dec 13 14:50:06.143000 audit[5071]: AVC avc: denied { bpf } for pid=5071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.143000 audit[5071]: AVC avc: denied { bpf } for pid=5071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.143000 audit[5071]: AVC avc: denied { bpf } for pid=5071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.143000 audit[5071]: AVC avc: denied { perfmon } for pid=5071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.143000 audit[5071]: AVC avc: denied { perfmon } for pid=5071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.143000 audit[5071]: AVC avc: denied { perfmon } for pid=5071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.143000 audit[5071]: AVC avc: denied { perfmon } for pid=5071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.143000 audit[5071]: AVC avc: denied { perfmon } for pid=5071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.143000 audit[5071]: AVC avc: denied { bpf } for pid=5071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.143000 audit[5071]: AVC avc: denied { bpf } for pid=5071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:06.143000 audit: BPF prog-id=204 op=LOAD Dec 13 14:50:06.143000 audit[5071]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028b638 items=0 ppid=4899 pid=5071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:06.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164306431366136303332643331666466376462306537636531386635 Dec 13 14:50:06.224420 env[1768]: time="2024-12-13T14:50:06.224356832Z" level=info msg="StartContainer for \"1d0d16a6032d31fdf7db0e7ce18f5b77389b5f2cda9c7c91eef3bd069644aa2a\" returns successfully" Dec 13 14:50:06.898725 kubelet[2628]: I1213 14:50:06.898424 2628 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-8476d774b7-cdj8q" podStartSLOduration=31.524933695 podStartE2EDuration="38.89839458s" podCreationTimestamp="2024-12-13 14:49:28 +0000 UTC" firstStartedPulling="2024-12-13 14:49:58.631043279 +0000 UTC m=+45.417501200" lastFinishedPulling="2024-12-13 14:50:06.004504176 +0000 UTC m=+52.790962085" observedRunningTime="2024-12-13 14:50:06.877744963 +0000 UTC m=+53.664202888" watchObservedRunningTime="2024-12-13 14:50:06.89839458 +0000 UTC m=+53.684852507" Dec 13 14:50:07.028948 systemd[1]: run-containerd-runc-k8s.io-1d0d16a6032d31fdf7db0e7ce18f5b77389b5f2cda9c7c91eef3bd069644aa2a-runc.sxpmnP.mount: Deactivated successfully. Dec 13 14:50:07.489000 audit[2499]: AVC avc: denied { watch } for pid=2499 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:50:07.489000 audit[2499]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002443200 a2=fc6 a3=0 items=0 ppid=2350 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:50:07.489000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:50:07.490000 audit[2499]: AVC avc: denied { watch } for pid=2499 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:50:07.490000 audit[2499]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002cde9c0 a2=fc6 a3=0 items=0 ppid=2350 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:50:07.490000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:50:07.907598 env[1768]: time="2024-12-13T14:50:07.907489891Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:07.912842 env[1768]: time="2024-12-13T14:50:07.912811321Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:07.915399 env[1768]: time="2024-12-13T14:50:07.915333355Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:07.917934 env[1768]: time="2024-12-13T14:50:07.917902847Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:50:07.918437 env[1768]: time="2024-12-13T14:50:07.918406470Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:50:07.921811 env[1768]: time="2024-12-13T14:50:07.921429901Z" level=info msg="CreateContainer within sandbox \"833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:50:07.941178 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1628268175.mount: Deactivated successfully. Dec 13 14:50:07.953947 env[1768]: time="2024-12-13T14:50:07.953901585Z" level=info msg="CreateContainer within sandbox \"833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"d0f4a8e33e229d64dc85fefbd355381e47b121fe3034ab0ed3862091f4e6aca6\"" Dec 13 14:50:07.956125 env[1768]: time="2024-12-13T14:50:07.954688009Z" level=info msg="StartContainer for \"d0f4a8e33e229d64dc85fefbd355381e47b121fe3034ab0ed3862091f4e6aca6\"" Dec 13 14:50:07.987649 systemd[1]: Started cri-containerd-d0f4a8e33e229d64dc85fefbd355381e47b121fe3034ab0ed3862091f4e6aca6.scope. Dec 13 14:50:08.013000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.013000 audit[5127]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f16963c0988 items=0 ppid=4549 pid=5127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:08.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430663461386533336532323964363464633835666566626433353533 Dec 13 14:50:08.013000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.013000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.013000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.013000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.013000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.013000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.013000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.013000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.013000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.013000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.013000 audit: BPF prog-id=205 op=LOAD Dec 13 14:50:08.013000 audit[5127]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00010a698 items=0 ppid=4549 pid=5127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:08.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430663461386533336532323964363464633835666566626433353533 Dec 13 14:50:08.013000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.013000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.013000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.013000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.013000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.013000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.013000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.013000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.013000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.013000 audit: BPF prog-id=206 op=LOAD Dec 13 14:50:08.013000 audit[5127]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00010a6e8 items=0 ppid=4549 pid=5127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:08.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430663461386533336532323964363464633835666566626433353533 Dec 13 14:50:08.013000 audit: BPF prog-id=206 op=UNLOAD Dec 13 14:50:08.013000 audit: BPF prog-id=205 op=UNLOAD Dec 13 14:50:08.014000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.014000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.014000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.014000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.014000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.014000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.014000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.014000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.014000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.014000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:50:08.014000 audit: BPF prog-id=207 op=LOAD Dec 13 14:50:08.014000 audit[5127]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00010a778 items=0 ppid=4549 pid=5127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:08.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430663461386533336532323964363464633835666566626433353533 Dec 13 14:50:08.040103 env[1768]: time="2024-12-13T14:50:08.040057851Z" level=info msg="StartContainer for \"d0f4a8e33e229d64dc85fefbd355381e47b121fe3034ab0ed3862091f4e6aca6\" returns successfully" Dec 13 14:50:08.733595 kubelet[2628]: I1213 14:50:08.729957 2628 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:50:08.738254 kubelet[2628]: I1213 14:50:08.738210 2628 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:50:08.854000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:50:08.854000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:50:08.854000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0048930e0 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:50:08.854000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:50:08.854000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c006ae45a0 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:50:08.854000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:50:08.862000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:50:08.862000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00674d260 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:50:08.862000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:50:08.866000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:50:08.866000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c006ae46c0 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:50:08.866000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:50:08.887000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:50:08.887000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:50:08.887000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0046d3740 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:50:08.887000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:50:08.887000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c006362840 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:50:08.887000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:50:13.486327 env[1768]: time="2024-12-13T14:50:13.486279247Z" level=info msg="StopPodSandbox for \"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870\"" Dec 13 14:50:13.544450 systemd[1]: run-containerd-runc-k8s.io-94db4d3ba450f57d79f668c14fc186d8b37c8b48aa2064ae80f86fe82b3454ae-runc.0UNeRz.mount: Deactivated successfully. Dec 13 14:50:13.752852 kubelet[2628]: I1213 14:50:13.752707 2628 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-5dmvf" podStartSLOduration=33.768012134 podStartE2EDuration="45.752680596s" podCreationTimestamp="2024-12-13 14:49:28 +0000 UTC" firstStartedPulling="2024-12-13 14:49:55.935039921 +0000 UTC m=+42.721497840" lastFinishedPulling="2024-12-13 14:50:07.919708387 +0000 UTC m=+54.706166302" observedRunningTime="2024-12-13 14:50:08.869582635 +0000 UTC m=+55.656040558" watchObservedRunningTime="2024-12-13 14:50:13.752680596 +0000 UTC m=+60.539138518" Dec 13 14:50:13.816000 audit[2499]: AVC avc: denied { watch } for pid=2499 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:50:13.818463 kernel: kauditd_printk_skb: 114 callbacks suppressed Dec 13 14:50:13.818556 kernel: audit: type=1400 audit(1734101413.816:1355): avc: denied { watch } for pid=2499 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:50:13.827970 kernel: audit: type=1300 audit(1734101413.816:1355): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00234e940 a2=fc6 a3=0 items=0 ppid=2350 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:50:13.816000 audit[2499]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00234e940 a2=fc6 a3=0 items=0 ppid=2350 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:50:13.816000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:50:13.821000 audit[2499]: AVC avc: denied { watch } for pid=2499 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:50:13.839359 kernel: audit: type=1327 audit(1734101413.816:1355): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:50:13.839445 kernel: audit: type=1400 audit(1734101413.821:1356): avc: denied { watch } for pid=2499 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:50:13.821000 audit[2499]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0022d37c0 a2=fc6 a3=0 items=0 ppid=2350 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:50:13.846129 kernel: audit: type=1300 audit(1734101413.821:1356): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0022d37c0 a2=fc6 a3=0 items=0 ppid=2350 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:50:13.847366 kernel: audit: type=1327 audit(1734101413.821:1356): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:50:13.821000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:50:13.844000 audit[2499]: AVC avc: denied { watch } for pid=2499 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:50:13.858313 kernel: audit: type=1400 audit(1734101413.844:1357): avc: denied { watch } for pid=2499 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:50:13.844000 audit[2499]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00234ea00 a2=fc6 a3=0 items=0 ppid=2350 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:50:13.844000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:50:13.868358 env[1768]: 2024-12-13 14:50:13.793 [WARNING][5189] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4829ad21-050f-4e15-8ac8-fbe8a63d9b6a", ResourceVersion:"867", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4", Pod:"csi-node-driver-5dmvf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.73.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali478931436d5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:13.868358 env[1768]: 2024-12-13 14:50:13.796 [INFO][5189] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" Dec 13 14:50:13.868358 env[1768]: 2024-12-13 14:50:13.796 [INFO][5189] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" iface="eth0" netns="" Dec 13 14:50:13.868358 env[1768]: 2024-12-13 14:50:13.796 [INFO][5189] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" Dec 13 14:50:13.868358 env[1768]: 2024-12-13 14:50:13.796 [INFO][5189] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" Dec 13 14:50:13.868358 env[1768]: 2024-12-13 14:50:13.829 [INFO][5207] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" HandleID="k8s-pod-network.01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" Workload="ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0" Dec 13 14:50:13.868358 env[1768]: 2024-12-13 14:50:13.829 [INFO][5207] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:13.868358 env[1768]: 2024-12-13 14:50:13.829 [INFO][5207] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:13.868358 env[1768]: 2024-12-13 14:50:13.851 [WARNING][5207] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" HandleID="k8s-pod-network.01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" Workload="ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0" Dec 13 14:50:13.868358 env[1768]: 2024-12-13 14:50:13.852 [INFO][5207] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" HandleID="k8s-pod-network.01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" Workload="ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0" Dec 13 14:50:13.868358 env[1768]: 2024-12-13 14:50:13.854 [INFO][5207] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:13.868358 env[1768]: 2024-12-13 14:50:13.860 [INFO][5189] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" Dec 13 14:50:13.869125 env[1768]: time="2024-12-13T14:50:13.869030632Z" level=info msg="TearDown network for sandbox \"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870\" successfully" Dec 13 14:50:13.869220 env[1768]: time="2024-12-13T14:50:13.869202816Z" level=info msg="StopPodSandbox for \"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870\" returns successfully" Dec 13 14:50:13.871595 env[1768]: time="2024-12-13T14:50:13.871565843Z" level=info msg="RemovePodSandbox for \"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870\"" Dec 13 14:50:13.871882 env[1768]: time="2024-12-13T14:50:13.871829896Z" level=info msg="Forcibly stopping sandbox \"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870\"" Dec 13 14:50:13.872940 kernel: audit: type=1300 audit(1734101413.844:1357): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00234ea00 a2=fc6 a3=0 items=0 ppid=2350 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:50:13.873119 kernel: audit: type=1327 audit(1734101413.844:1357): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:50:13.844000 audit[2499]: AVC avc: denied { watch } for pid=2499 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:50:13.844000 audit[2499]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00234ea40 a2=fc6 a3=0 items=0 ppid=2350 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:50:13.844000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:50:13.878311 kernel: audit: type=1400 audit(1734101413.844:1358): avc: denied { watch } for pid=2499 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:50:14.021805 env[1768]: 2024-12-13 14:50:13.971 [WARNING][5227] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4829ad21-050f-4e15-8ac8-fbe8a63d9b6a", ResourceVersion:"867", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"833aa8488332303eae39787fbef02c7add0188265cf3ad84b9d90a860dc581d4", Pod:"csi-node-driver-5dmvf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.73.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali478931436d5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:14.021805 env[1768]: 2024-12-13 14:50:13.971 [INFO][5227] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" Dec 13 14:50:14.021805 env[1768]: 2024-12-13 14:50:13.971 [INFO][5227] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" iface="eth0" netns="" Dec 13 14:50:14.021805 env[1768]: 2024-12-13 14:50:13.971 [INFO][5227] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" Dec 13 14:50:14.021805 env[1768]: 2024-12-13 14:50:13.971 [INFO][5227] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" Dec 13 14:50:14.021805 env[1768]: 2024-12-13 14:50:14.004 [INFO][5234] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" HandleID="k8s-pod-network.01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" Workload="ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0" Dec 13 14:50:14.021805 env[1768]: 2024-12-13 14:50:14.004 [INFO][5234] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:14.021805 env[1768]: 2024-12-13 14:50:14.004 [INFO][5234] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:14.021805 env[1768]: 2024-12-13 14:50:14.015 [WARNING][5234] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" HandleID="k8s-pod-network.01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" Workload="ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0" Dec 13 14:50:14.021805 env[1768]: 2024-12-13 14:50:14.015 [INFO][5234] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" HandleID="k8s-pod-network.01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" Workload="ip--172--31--25--13-k8s-csi--node--driver--5dmvf-eth0" Dec 13 14:50:14.021805 env[1768]: 2024-12-13 14:50:14.017 [INFO][5234] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:14.021805 env[1768]: 2024-12-13 14:50:14.019 [INFO][5227] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870" Dec 13 14:50:14.023269 env[1768]: time="2024-12-13T14:50:14.021779837Z" level=info msg="TearDown network for sandbox \"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870\" successfully" Dec 13 14:50:14.028510 env[1768]: time="2024-12-13T14:50:14.028475447Z" level=info msg="RemovePodSandbox \"01d06ab2bf49ee9126d55d4e606fff899135defb06f33d4c9cea8223a122c870\" returns successfully" Dec 13 14:50:14.031501 env[1768]: time="2024-12-13T14:50:14.031468615Z" level=info msg="StopPodSandbox for \"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437\"" Dec 13 14:50:14.126736 env[1768]: 2024-12-13 14:50:14.078 [WARNING][5253] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0", GenerateName:"calico-apiserver-5cbbfffd85-", Namespace:"calico-apiserver", SelfLink:"", UID:"6051e298-e50c-4744-bd52-0b5ad22e6435", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cbbfffd85", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5", Pod:"calico-apiserver-5cbbfffd85-44tds", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.73.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0e94f89924b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:14.126736 env[1768]: 2024-12-13 14:50:14.078 [INFO][5253] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" Dec 13 14:50:14.126736 env[1768]: 2024-12-13 14:50:14.078 [INFO][5253] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" iface="eth0" netns="" Dec 13 14:50:14.126736 env[1768]: 2024-12-13 14:50:14.078 [INFO][5253] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" Dec 13 14:50:14.126736 env[1768]: 2024-12-13 14:50:14.078 [INFO][5253] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" Dec 13 14:50:14.126736 env[1768]: 2024-12-13 14:50:14.114 [INFO][5259] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" HandleID="k8s-pod-network.79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0" Dec 13 14:50:14.126736 env[1768]: 2024-12-13 14:50:14.114 [INFO][5259] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:14.126736 env[1768]: 2024-12-13 14:50:14.114 [INFO][5259] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:14.126736 env[1768]: 2024-12-13 14:50:14.121 [WARNING][5259] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" HandleID="k8s-pod-network.79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0" Dec 13 14:50:14.126736 env[1768]: 2024-12-13 14:50:14.121 [INFO][5259] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" HandleID="k8s-pod-network.79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0" Dec 13 14:50:14.126736 env[1768]: 2024-12-13 14:50:14.122 [INFO][5259] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:14.126736 env[1768]: 2024-12-13 14:50:14.124 [INFO][5253] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" Dec 13 14:50:14.128041 env[1768]: time="2024-12-13T14:50:14.126780914Z" level=info msg="TearDown network for sandbox \"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437\" successfully" Dec 13 14:50:14.128041 env[1768]: time="2024-12-13T14:50:14.126817361Z" level=info msg="StopPodSandbox for \"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437\" returns successfully" Dec 13 14:50:14.128041 env[1768]: time="2024-12-13T14:50:14.127313854Z" level=info msg="RemovePodSandbox for \"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437\"" Dec 13 14:50:14.128041 env[1768]: time="2024-12-13T14:50:14.127342890Z" level=info msg="Forcibly stopping sandbox \"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437\"" Dec 13 14:50:14.226483 env[1768]: 2024-12-13 14:50:14.183 [WARNING][5277] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0", GenerateName:"calico-apiserver-5cbbfffd85-", Namespace:"calico-apiserver", SelfLink:"", UID:"6051e298-e50c-4744-bd52-0b5ad22e6435", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cbbfffd85", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"61ca9fd4490486d1e44251c5bb31a67ada65d289984a3401aba582f25d07eea5", Pod:"calico-apiserver-5cbbfffd85-44tds", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.73.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0e94f89924b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:14.226483 env[1768]: 2024-12-13 14:50:14.183 [INFO][5277] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" Dec 13 14:50:14.226483 env[1768]: 2024-12-13 14:50:14.183 [INFO][5277] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" iface="eth0" netns="" Dec 13 14:50:14.226483 env[1768]: 2024-12-13 14:50:14.183 [INFO][5277] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" Dec 13 14:50:14.226483 env[1768]: 2024-12-13 14:50:14.183 [INFO][5277] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" Dec 13 14:50:14.226483 env[1768]: 2024-12-13 14:50:14.210 [INFO][5284] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" HandleID="k8s-pod-network.79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0" Dec 13 14:50:14.226483 env[1768]: 2024-12-13 14:50:14.210 [INFO][5284] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:14.226483 env[1768]: 2024-12-13 14:50:14.210 [INFO][5284] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:14.226483 env[1768]: 2024-12-13 14:50:14.220 [WARNING][5284] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" HandleID="k8s-pod-network.79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0" Dec 13 14:50:14.226483 env[1768]: 2024-12-13 14:50:14.221 [INFO][5284] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" HandleID="k8s-pod-network.79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--44tds-eth0" Dec 13 14:50:14.226483 env[1768]: 2024-12-13 14:50:14.222 [INFO][5284] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:14.226483 env[1768]: 2024-12-13 14:50:14.224 [INFO][5277] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437" Dec 13 14:50:14.227155 env[1768]: time="2024-12-13T14:50:14.226516925Z" level=info msg="TearDown network for sandbox \"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437\" successfully" Dec 13 14:50:14.231963 env[1768]: time="2024-12-13T14:50:14.231917870Z" level=info msg="RemovePodSandbox \"79948365b23f31d3548290aed981d1d12dc5b8c1b40b3e8b923645b8b0efc437\" returns successfully" Dec 13 14:50:14.232519 env[1768]: time="2024-12-13T14:50:14.232483570Z" level=info msg="StopPodSandbox for \"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f\"" Dec 13 14:50:14.313740 env[1768]: 2024-12-13 14:50:14.274 [WARNING][5303] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0", GenerateName:"calico-kube-controllers-8476d774b7-", Namespace:"calico-system", SelfLink:"", UID:"8fd2a2a6-7426-4b36-a158-0c72069bd492", ResourceVersion:"854", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8476d774b7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968", Pod:"calico-kube-controllers-8476d774b7-cdj8q", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.73.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali726a98bc1e8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:14.313740 env[1768]: 2024-12-13 14:50:14.274 [INFO][5303] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" Dec 13 14:50:14.313740 env[1768]: 2024-12-13 14:50:14.274 [INFO][5303] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" iface="eth0" netns="" Dec 13 14:50:14.313740 env[1768]: 2024-12-13 14:50:14.274 [INFO][5303] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" Dec 13 14:50:14.313740 env[1768]: 2024-12-13 14:50:14.274 [INFO][5303] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" Dec 13 14:50:14.313740 env[1768]: 2024-12-13 14:50:14.300 [INFO][5309] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" HandleID="k8s-pod-network.7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" Workload="ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0" Dec 13 14:50:14.313740 env[1768]: 2024-12-13 14:50:14.300 [INFO][5309] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:14.313740 env[1768]: 2024-12-13 14:50:14.300 [INFO][5309] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:14.313740 env[1768]: 2024-12-13 14:50:14.306 [WARNING][5309] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" HandleID="k8s-pod-network.7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" Workload="ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0" Dec 13 14:50:14.313740 env[1768]: 2024-12-13 14:50:14.306 [INFO][5309] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" HandleID="k8s-pod-network.7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" Workload="ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0" Dec 13 14:50:14.313740 env[1768]: 2024-12-13 14:50:14.308 [INFO][5309] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:14.313740 env[1768]: 2024-12-13 14:50:14.309 [INFO][5303] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" Dec 13 14:50:14.313740 env[1768]: time="2024-12-13T14:50:14.311519061Z" level=info msg="TearDown network for sandbox \"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f\" successfully" Dec 13 14:50:14.313740 env[1768]: time="2024-12-13T14:50:14.311556813Z" level=info msg="StopPodSandbox for \"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f\" returns successfully" Dec 13 14:50:14.313740 env[1768]: time="2024-12-13T14:50:14.312411433Z" level=info msg="RemovePodSandbox for \"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f\"" Dec 13 14:50:14.313740 env[1768]: time="2024-12-13T14:50:14.312501357Z" level=info msg="Forcibly stopping sandbox \"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f\"" Dec 13 14:50:14.429712 env[1768]: 2024-12-13 14:50:14.372 [WARNING][5327] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0", GenerateName:"calico-kube-controllers-8476d774b7-", Namespace:"calico-system", SelfLink:"", UID:"8fd2a2a6-7426-4b36-a158-0c72069bd492", ResourceVersion:"854", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8476d774b7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"996468ceafe33f21fe36f34524f75763d4cf96c2aea692ad0bf9d0d07fad1968", Pod:"calico-kube-controllers-8476d774b7-cdj8q", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.73.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali726a98bc1e8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:14.429712 env[1768]: 2024-12-13 14:50:14.372 [INFO][5327] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" Dec 13 14:50:14.429712 env[1768]: 2024-12-13 14:50:14.372 [INFO][5327] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" iface="eth0" netns="" Dec 13 14:50:14.429712 env[1768]: 2024-12-13 14:50:14.372 [INFO][5327] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" Dec 13 14:50:14.429712 env[1768]: 2024-12-13 14:50:14.372 [INFO][5327] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" Dec 13 14:50:14.429712 env[1768]: 2024-12-13 14:50:14.414 [INFO][5333] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" HandleID="k8s-pod-network.7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" Workload="ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0" Dec 13 14:50:14.429712 env[1768]: 2024-12-13 14:50:14.414 [INFO][5333] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:14.429712 env[1768]: 2024-12-13 14:50:14.414 [INFO][5333] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:14.429712 env[1768]: 2024-12-13 14:50:14.422 [WARNING][5333] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" HandleID="k8s-pod-network.7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" Workload="ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0" Dec 13 14:50:14.429712 env[1768]: 2024-12-13 14:50:14.422 [INFO][5333] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" HandleID="k8s-pod-network.7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" Workload="ip--172--31--25--13-k8s-calico--kube--controllers--8476d774b7--cdj8q-eth0" Dec 13 14:50:14.429712 env[1768]: 2024-12-13 14:50:14.425 [INFO][5333] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:14.429712 env[1768]: 2024-12-13 14:50:14.427 [INFO][5327] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f" Dec 13 14:50:14.430671 env[1768]: time="2024-12-13T14:50:14.430509336Z" level=info msg="TearDown network for sandbox \"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f\" successfully" Dec 13 14:50:14.443133 env[1768]: time="2024-12-13T14:50:14.443083386Z" level=info msg="RemovePodSandbox \"7a629468c4ce3e2e849cefdaf65f26f54430a16e7b0d9de9dc0c2e4dcd11c97f\" returns successfully" Dec 13 14:50:14.448376 env[1768]: time="2024-12-13T14:50:14.448336400Z" level=info msg="StopPodSandbox for \"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e\"" Dec 13 14:50:14.558966 env[1768]: 2024-12-13 14:50:14.509 [WARNING][5353] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"eb090e6c-bfe4-4317-8bac-84d14254dc2a", ResourceVersion:"769", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214", Pod:"coredns-6f6b679f8f-cj7kv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.73.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib3f765f085b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:14.558966 env[1768]: 2024-12-13 14:50:14.510 [INFO][5353] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" Dec 13 14:50:14.558966 env[1768]: 2024-12-13 14:50:14.510 [INFO][5353] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" iface="eth0" netns="" Dec 13 14:50:14.558966 env[1768]: 2024-12-13 14:50:14.510 [INFO][5353] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" Dec 13 14:50:14.558966 env[1768]: 2024-12-13 14:50:14.510 [INFO][5353] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" Dec 13 14:50:14.558966 env[1768]: 2024-12-13 14:50:14.545 [INFO][5360] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" HandleID="k8s-pod-network.0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0" Dec 13 14:50:14.558966 env[1768]: 2024-12-13 14:50:14.545 [INFO][5360] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:14.558966 env[1768]: 2024-12-13 14:50:14.546 [INFO][5360] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:14.558966 env[1768]: 2024-12-13 14:50:14.553 [WARNING][5360] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" HandleID="k8s-pod-network.0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0" Dec 13 14:50:14.558966 env[1768]: 2024-12-13 14:50:14.553 [INFO][5360] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" HandleID="k8s-pod-network.0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0" Dec 13 14:50:14.558966 env[1768]: 2024-12-13 14:50:14.554 [INFO][5360] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:14.558966 env[1768]: 2024-12-13 14:50:14.556 [INFO][5353] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" Dec 13 14:50:14.560156 env[1768]: time="2024-12-13T14:50:14.559014135Z" level=info msg="TearDown network for sandbox \"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e\" successfully" Dec 13 14:50:14.560156 env[1768]: time="2024-12-13T14:50:14.559050600Z" level=info msg="StopPodSandbox for \"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e\" returns successfully" Dec 13 14:50:14.560437 env[1768]: time="2024-12-13T14:50:14.560404418Z" level=info msg="RemovePodSandbox for \"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e\"" Dec 13 14:50:14.560539 env[1768]: time="2024-12-13T14:50:14.560444854Z" level=info msg="Forcibly stopping sandbox \"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e\"" Dec 13 14:50:14.644249 env[1768]: 2024-12-13 14:50:14.598 [WARNING][5379] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"eb090e6c-bfe4-4317-8bac-84d14254dc2a", ResourceVersion:"769", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"1a6d8e4837c2ae6b77d46ecfbd1c54c434c253152faa77620cf1049bd149e214", Pod:"coredns-6f6b679f8f-cj7kv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.73.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib3f765f085b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:14.644249 env[1768]: 2024-12-13 14:50:14.598 [INFO][5379] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" Dec 13 14:50:14.644249 env[1768]: 2024-12-13 14:50:14.598 [INFO][5379] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" iface="eth0" netns="" Dec 13 14:50:14.644249 env[1768]: 2024-12-13 14:50:14.598 [INFO][5379] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" Dec 13 14:50:14.644249 env[1768]: 2024-12-13 14:50:14.598 [INFO][5379] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" Dec 13 14:50:14.644249 env[1768]: 2024-12-13 14:50:14.629 [INFO][5386] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" HandleID="k8s-pod-network.0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0" Dec 13 14:50:14.644249 env[1768]: 2024-12-13 14:50:14.630 [INFO][5386] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:14.644249 env[1768]: 2024-12-13 14:50:14.630 [INFO][5386] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:14.644249 env[1768]: 2024-12-13 14:50:14.635 [WARNING][5386] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" HandleID="k8s-pod-network.0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0" Dec 13 14:50:14.644249 env[1768]: 2024-12-13 14:50:14.635 [INFO][5386] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" HandleID="k8s-pod-network.0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--cj7kv-eth0" Dec 13 14:50:14.644249 env[1768]: 2024-12-13 14:50:14.637 [INFO][5386] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:14.644249 env[1768]: 2024-12-13 14:50:14.639 [INFO][5379] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e" Dec 13 14:50:14.644249 env[1768]: time="2024-12-13T14:50:14.641699455Z" level=info msg="TearDown network for sandbox \"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e\" successfully" Dec 13 14:50:14.647196 env[1768]: time="2024-12-13T14:50:14.647152003Z" level=info msg="RemovePodSandbox \"0001939816f4f8688aefd0a409ed1033f27d53422e3c8ced70939f6b07befc5e\" returns successfully" Dec 13 14:50:14.647789 env[1768]: time="2024-12-13T14:50:14.647762322Z" level=info msg="StopPodSandbox for \"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1\"" Dec 13 14:50:14.738724 env[1768]: 2024-12-13 14:50:14.690 [WARNING][5405] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"5d2c84cb-46ac-42d4-bbcb-b6e69aa931ca", ResourceVersion:"802", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197", Pod:"coredns-6f6b679f8f-6rqpd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.73.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali173cd2fa4c4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:14.738724 env[1768]: 2024-12-13 14:50:14.690 [INFO][5405] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" Dec 13 14:50:14.738724 env[1768]: 2024-12-13 14:50:14.691 [INFO][5405] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" iface="eth0" netns="" Dec 13 14:50:14.738724 env[1768]: 2024-12-13 14:50:14.691 [INFO][5405] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" Dec 13 14:50:14.738724 env[1768]: 2024-12-13 14:50:14.691 [INFO][5405] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" Dec 13 14:50:14.738724 env[1768]: 2024-12-13 14:50:14.725 [INFO][5411] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" HandleID="k8s-pod-network.991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0" Dec 13 14:50:14.738724 env[1768]: 2024-12-13 14:50:14.725 [INFO][5411] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:14.738724 env[1768]: 2024-12-13 14:50:14.725 [INFO][5411] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:14.738724 env[1768]: 2024-12-13 14:50:14.733 [WARNING][5411] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" HandleID="k8s-pod-network.991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0" Dec 13 14:50:14.738724 env[1768]: 2024-12-13 14:50:14.733 [INFO][5411] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" HandleID="k8s-pod-network.991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0" Dec 13 14:50:14.738724 env[1768]: 2024-12-13 14:50:14.735 [INFO][5411] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:14.738724 env[1768]: 2024-12-13 14:50:14.736 [INFO][5405] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" Dec 13 14:50:14.739766 env[1768]: time="2024-12-13T14:50:14.738783407Z" level=info msg="TearDown network for sandbox \"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1\" successfully" Dec 13 14:50:14.739766 env[1768]: time="2024-12-13T14:50:14.738818140Z" level=info msg="StopPodSandbox for \"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1\" returns successfully" Dec 13 14:50:14.739766 env[1768]: time="2024-12-13T14:50:14.739345371Z" level=info msg="RemovePodSandbox for \"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1\"" Dec 13 14:50:14.739766 env[1768]: time="2024-12-13T14:50:14.739380897Z" level=info msg="Forcibly stopping sandbox \"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1\"" Dec 13 14:50:14.926042 env[1768]: 2024-12-13 14:50:14.830 [WARNING][5430] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"5d2c84cb-46ac-42d4-bbcb-b6e69aa931ca", ResourceVersion:"802", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"eee66bad14daf7c582d310f4d84002003324966a553642335593a0664e03c197", Pod:"coredns-6f6b679f8f-6rqpd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.73.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali173cd2fa4c4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:14.926042 env[1768]: 2024-12-13 14:50:14.831 [INFO][5430] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" Dec 13 14:50:14.926042 env[1768]: 2024-12-13 14:50:14.831 [INFO][5430] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" iface="eth0" netns="" Dec 13 14:50:14.926042 env[1768]: 2024-12-13 14:50:14.831 [INFO][5430] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" Dec 13 14:50:14.926042 env[1768]: 2024-12-13 14:50:14.831 [INFO][5430] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" Dec 13 14:50:14.926042 env[1768]: 2024-12-13 14:50:14.893 [INFO][5437] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" HandleID="k8s-pod-network.991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0" Dec 13 14:50:14.926042 env[1768]: 2024-12-13 14:50:14.893 [INFO][5437] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:14.926042 env[1768]: 2024-12-13 14:50:14.893 [INFO][5437] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:14.926042 env[1768]: 2024-12-13 14:50:14.914 [WARNING][5437] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" HandleID="k8s-pod-network.991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0" Dec 13 14:50:14.926042 env[1768]: 2024-12-13 14:50:14.914 [INFO][5437] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" HandleID="k8s-pod-network.991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" Workload="ip--172--31--25--13-k8s-coredns--6f6b679f8f--6rqpd-eth0" Dec 13 14:50:14.926042 env[1768]: 2024-12-13 14:50:14.920 [INFO][5437] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:14.926042 env[1768]: 2024-12-13 14:50:14.922 [INFO][5430] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1" Dec 13 14:50:14.926768 env[1768]: time="2024-12-13T14:50:14.926083690Z" level=info msg="TearDown network for sandbox \"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1\" successfully" Dec 13 14:50:14.931519 env[1768]: time="2024-12-13T14:50:14.931452807Z" level=info msg="RemovePodSandbox \"991f794fc8c652f8d603dee8c8b803b3507a894ebc1d22f9c827f34560ae92f1\" returns successfully" Dec 13 14:50:14.932049 env[1768]: time="2024-12-13T14:50:14.932016932Z" level=info msg="StopPodSandbox for \"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f\"" Dec 13 14:50:15.027569 env[1768]: 2024-12-13 14:50:14.992 [WARNING][5457] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0", GenerateName:"calico-apiserver-5cbbfffd85-", Namespace:"calico-apiserver", SelfLink:"", UID:"c3a29363-5614-4c3a-a49a-7a5afb98c592", ResourceVersion:"813", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cbbfffd85", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373", Pod:"calico-apiserver-5cbbfffd85-dl4wj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.73.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali912957c5670", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:15.027569 env[1768]: 2024-12-13 14:50:14.992 [INFO][5457] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" Dec 13 14:50:15.027569 env[1768]: 2024-12-13 14:50:14.992 [INFO][5457] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" iface="eth0" netns="" Dec 13 14:50:15.027569 env[1768]: 2024-12-13 14:50:14.992 [INFO][5457] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" Dec 13 14:50:15.027569 env[1768]: 2024-12-13 14:50:14.992 [INFO][5457] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" Dec 13 14:50:15.027569 env[1768]: 2024-12-13 14:50:15.016 [INFO][5463] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" HandleID="k8s-pod-network.5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0" Dec 13 14:50:15.027569 env[1768]: 2024-12-13 14:50:15.016 [INFO][5463] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:15.027569 env[1768]: 2024-12-13 14:50:15.016 [INFO][5463] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:15.027569 env[1768]: 2024-12-13 14:50:15.022 [WARNING][5463] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" HandleID="k8s-pod-network.5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0" Dec 13 14:50:15.027569 env[1768]: 2024-12-13 14:50:15.022 [INFO][5463] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" HandleID="k8s-pod-network.5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0" Dec 13 14:50:15.027569 env[1768]: 2024-12-13 14:50:15.024 [INFO][5463] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:15.027569 env[1768]: 2024-12-13 14:50:15.025 [INFO][5457] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" Dec 13 14:50:15.028182 env[1768]: time="2024-12-13T14:50:15.027595639Z" level=info msg="TearDown network for sandbox \"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f\" successfully" Dec 13 14:50:15.028182 env[1768]: time="2024-12-13T14:50:15.027632469Z" level=info msg="StopPodSandbox for \"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f\" returns successfully" Dec 13 14:50:15.028526 env[1768]: time="2024-12-13T14:50:15.028496763Z" level=info msg="RemovePodSandbox for \"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f\"" Dec 13 14:50:15.028702 env[1768]: time="2024-12-13T14:50:15.028645659Z" level=info msg="Forcibly stopping sandbox \"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f\"" Dec 13 14:50:15.105437 env[1768]: 2024-12-13 14:50:15.069 [WARNING][5481] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0", GenerateName:"calico-apiserver-5cbbfffd85-", Namespace:"calico-apiserver", SelfLink:"", UID:"c3a29363-5614-4c3a-a49a-7a5afb98c592", ResourceVersion:"813", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 49, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cbbfffd85", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-13", ContainerID:"b675752b00c013bf9867daf91352391fc2e89d15d5ff4891e1081c79838bd373", Pod:"calico-apiserver-5cbbfffd85-dl4wj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.73.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali912957c5670", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:50:15.105437 env[1768]: 2024-12-13 14:50:15.069 [INFO][5481] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" Dec 13 14:50:15.105437 env[1768]: 2024-12-13 14:50:15.069 [INFO][5481] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" iface="eth0" netns="" Dec 13 14:50:15.105437 env[1768]: 2024-12-13 14:50:15.069 [INFO][5481] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" Dec 13 14:50:15.105437 env[1768]: 2024-12-13 14:50:15.069 [INFO][5481] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" Dec 13 14:50:15.105437 env[1768]: 2024-12-13 14:50:15.093 [INFO][5487] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" HandleID="k8s-pod-network.5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0" Dec 13 14:50:15.105437 env[1768]: 2024-12-13 14:50:15.094 [INFO][5487] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:50:15.105437 env[1768]: 2024-12-13 14:50:15.094 [INFO][5487] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:50:15.105437 env[1768]: 2024-12-13 14:50:15.100 [WARNING][5487] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" HandleID="k8s-pod-network.5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0" Dec 13 14:50:15.105437 env[1768]: 2024-12-13 14:50:15.100 [INFO][5487] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" HandleID="k8s-pod-network.5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" Workload="ip--172--31--25--13-k8s-calico--apiserver--5cbbfffd85--dl4wj-eth0" Dec 13 14:50:15.105437 env[1768]: 2024-12-13 14:50:15.101 [INFO][5487] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:50:15.105437 env[1768]: 2024-12-13 14:50:15.103 [INFO][5481] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f" Dec 13 14:50:15.106451 env[1768]: time="2024-12-13T14:50:15.105486425Z" level=info msg="TearDown network for sandbox \"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f\" successfully" Dec 13 14:50:15.110295 env[1768]: time="2024-12-13T14:50:15.110245933Z" level=info msg="RemovePodSandbox \"5bc8c31e2325dfc0d739b5472f2490e471b620e26a490a3e6044e32b86aa384f\" returns successfully" Dec 13 14:50:15.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.25.13:22-139.178.89.65:50954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:15.186092 systemd[1]: Started sshd@7-172.31.25.13:22-139.178.89.65:50954.service. Dec 13 14:50:15.448000 audit[5494]: USER_ACCT pid=5494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:15.449980 sshd[5494]: Accepted publickey for core from 139.178.89.65 port 50954 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:50:15.450000 audit[5494]: CRED_ACQ pid=5494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:15.450000 audit[5494]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5cf2ed80 a2=3 a3=0 items=0 ppid=1 pid=5494 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:15.450000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:50:15.454753 sshd[5494]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:50:15.465639 systemd-logind[1732]: New session 8 of user core. Dec 13 14:50:15.469638 systemd[1]: Started session-8.scope. Dec 13 14:50:15.477000 audit[5494]: USER_START pid=5494 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:15.479000 audit[5496]: CRED_ACQ pid=5496 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:16.378866 sshd[5494]: pam_unix(sshd:session): session closed for user core Dec 13 14:50:16.380000 audit[5494]: USER_END pid=5494 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:16.380000 audit[5494]: CRED_DISP pid=5494 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:16.383909 systemd[1]: sshd@7-172.31.25.13:22-139.178.89.65:50954.service: Deactivated successfully. Dec 13 14:50:16.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.25.13:22-139.178.89.65:50954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:16.387076 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:50:16.388180 systemd-logind[1732]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:50:16.389206 systemd-logind[1732]: Removed session 8. Dec 13 14:50:18.465380 systemd[1]: run-containerd-runc-k8s.io-1d0d16a6032d31fdf7db0e7ce18f5b77389b5f2cda9c7c91eef3bd069644aa2a-runc.Bz9xJT.mount: Deactivated successfully. Dec 13 14:50:20.103408 kubelet[2628]: I1213 14:50:20.103358 2628 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:50:20.196883 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 14:50:20.197017 kernel: audit: type=1325 audit(1734101420.192:1368): table=filter:121 family=2 entries=8 op=nft_register_rule pid=5530 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:50:20.192000 audit[5530]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=5530 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:50:20.203335 kernel: audit: type=1300 audit(1734101420.192:1368): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc6a2dff40 a2=0 a3=7ffc6a2dff2c items=0 ppid=3063 pid=5530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:20.192000 audit[5530]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc6a2dff40 a2=0 a3=7ffc6a2dff2c items=0 ppid=3063 pid=5530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:20.192000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:50:20.209280 kernel: audit: type=1327 audit(1734101420.192:1368): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:50:20.284670 kernel: audit: type=1325 audit(1734101420.275:1369): table=nat:122 family=2 entries=34 op=nft_register_chain pid=5530 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:50:20.284818 kernel: audit: type=1300 audit(1734101420.275:1369): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffc6a2dff40 a2=0 a3=7ffc6a2dff2c items=0 ppid=3063 pid=5530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:20.275000 audit[5530]: NETFILTER_CFG table=nat:122 family=2 entries=34 op=nft_register_chain pid=5530 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:50:20.275000 audit[5530]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffc6a2dff40 a2=0 a3=7ffc6a2dff2c items=0 ppid=3063 pid=5530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:20.275000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:50:20.291283 kernel: audit: type=1327 audit(1734101420.275:1369): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:50:21.408368 systemd[1]: Started sshd@8-172.31.25.13:22-139.178.89.65:43498.service. Dec 13 14:50:21.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.25.13:22-139.178.89.65:43498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:21.414305 kernel: audit: type=1130 audit(1734101421.408:1370): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.25.13:22-139.178.89.65:43498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:21.597000 audit[5532]: USER_ACCT pid=5532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:21.603924 sshd[5532]: Accepted publickey for core from 139.178.89.65 port 43498 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:50:21.604428 kernel: audit: type=1101 audit(1734101421.597:1371): pid=5532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:21.604000 audit[5532]: CRED_ACQ pid=5532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:21.612018 kernel: audit: type=1103 audit(1734101421.604:1372): pid=5532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:21.612391 kernel: audit: type=1006 audit(1734101421.604:1373): pid=5532 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Dec 13 14:50:21.613100 sshd[5532]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:50:21.604000 audit[5532]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffacc688b0 a2=3 a3=0 items=0 ppid=1 pid=5532 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:21.604000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:50:21.626362 systemd-logind[1732]: New session 9 of user core. Dec 13 14:50:21.629994 systemd[1]: Started session-9.scope. Dec 13 14:50:21.638000 audit[5532]: USER_START pid=5532 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:21.641000 audit[5534]: CRED_ACQ pid=5534 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:21.935475 sshd[5532]: pam_unix(sshd:session): session closed for user core Dec 13 14:50:21.937000 audit[5532]: USER_END pid=5532 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:21.937000 audit[5532]: CRED_DISP pid=5532 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:21.939683 systemd[1]: sshd@8-172.31.25.13:22-139.178.89.65:43498.service: Deactivated successfully. Dec 13 14:50:21.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.25.13:22-139.178.89.65:43498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:21.940838 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:50:21.941708 systemd-logind[1732]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:50:21.942852 systemd-logind[1732]: Removed session 9. Dec 13 14:50:22.237148 systemd[1]: run-containerd-runc-k8s.io-1d0d16a6032d31fdf7db0e7ce18f5b77389b5f2cda9c7c91eef3bd069644aa2a-runc.Plq9DM.mount: Deactivated successfully. Dec 13 14:50:26.962579 systemd[1]: Started sshd@9-172.31.25.13:22-139.178.89.65:43500.service. Dec 13 14:50:26.966253 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:50:26.966367 kernel: audit: type=1130 audit(1734101426.961:1379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.25.13:22-139.178.89.65:43500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:26.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.25.13:22-139.178.89.65:43500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:27.170000 audit[5564]: USER_ACCT pid=5564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:27.176352 kernel: audit: type=1101 audit(1734101427.170:1380): pid=5564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:27.176406 sshd[5564]: Accepted publickey for core from 139.178.89.65 port 43500 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:50:27.175000 audit[5564]: CRED_ACQ pid=5564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:27.184409 kernel: audit: type=1103 audit(1734101427.175:1381): pid=5564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:27.184501 kernel: audit: type=1006 audit(1734101427.175:1382): pid=5564 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 14:50:27.184532 kernel: audit: type=1300 audit(1734101427.175:1382): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb474f710 a2=3 a3=0 items=0 ppid=1 pid=5564 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:27.175000 audit[5564]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb474f710 a2=3 a3=0 items=0 ppid=1 pid=5564 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:27.185117 sshd[5564]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:50:27.175000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:50:27.190708 kernel: audit: type=1327 audit(1734101427.175:1382): proctitle=737368643A20636F7265205B707269765D Dec 13 14:50:27.194067 systemd-logind[1732]: New session 10 of user core. Dec 13 14:50:27.194794 systemd[1]: Started session-10.scope. Dec 13 14:50:27.200000 audit[5564]: USER_START pid=5564 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:27.203000 audit[5566]: CRED_ACQ pid=5566 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:27.209879 kernel: audit: type=1105 audit(1734101427.200:1383): pid=5564 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:27.210252 kernel: audit: type=1103 audit(1734101427.203:1384): pid=5566 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:27.461496 sshd[5564]: pam_unix(sshd:session): session closed for user core Dec 13 14:50:27.462000 audit[5564]: USER_END pid=5564 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:27.466000 audit[5564]: CRED_DISP pid=5564 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:27.470845 systemd-logind[1732]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:50:27.474037 kernel: audit: type=1106 audit(1734101427.462:1385): pid=5564 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:27.474103 kernel: audit: type=1104 audit(1734101427.466:1386): pid=5564 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:27.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.25.13:22-139.178.89.65:43500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:27.472781 systemd[1]: sshd@9-172.31.25.13:22-139.178.89.65:43500.service: Deactivated successfully. Dec 13 14:50:27.473634 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:50:27.475256 systemd-logind[1732]: Removed session 10. Dec 13 14:50:32.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.25.13:22-139.178.89.65:51436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:32.487990 systemd[1]: Started sshd@10-172.31.25.13:22-139.178.89.65:51436.service. Dec 13 14:50:32.493187 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:50:32.493338 kernel: audit: type=1130 audit(1734101432.487:1388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.25.13:22-139.178.89.65:51436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:32.681000 audit[5577]: USER_ACCT pid=5577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:32.695023 kernel: audit: type=1101 audit(1734101432.681:1389): pid=5577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:32.695849 kernel: audit: type=1103 audit(1734101432.681:1390): pid=5577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:32.681000 audit[5577]: CRED_ACQ pid=5577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:32.696084 sshd[5577]: Accepted publickey for core from 139.178.89.65 port 51436 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:50:32.688671 sshd[5577]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:50:32.700610 kernel: audit: type=1006 audit(1734101432.681:1391): pid=5577 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 14:50:32.681000 audit[5577]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffabf659f0 a2=3 a3=0 items=0 ppid=1 pid=5577 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:32.710340 kernel: audit: type=1300 audit(1734101432.681:1391): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffabf659f0 a2=3 a3=0 items=0 ppid=1 pid=5577 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:32.713042 systemd-logind[1732]: New session 11 of user core. Dec 13 14:50:32.715335 systemd[1]: Started session-11.scope. Dec 13 14:50:32.681000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:50:32.719300 kernel: audit: type=1327 audit(1734101432.681:1391): proctitle=737368643A20636F7265205B707269765D Dec 13 14:50:32.728000 audit[5577]: USER_START pid=5577 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:32.736492 kernel: audit: type=1105 audit(1734101432.728:1392): pid=5577 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:32.736593 kernel: audit: type=1103 audit(1734101432.734:1393): pid=5585 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:32.734000 audit[5585]: CRED_ACQ pid=5585 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:33.047555 sshd[5577]: pam_unix(sshd:session): session closed for user core Dec 13 14:50:33.048000 audit[5577]: USER_END pid=5577 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:33.057729 kernel: audit: type=1106 audit(1734101433.048:1394): pid=5577 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:33.057868 kernel: audit: type=1104 audit(1734101433.054:1395): pid=5577 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:33.054000 audit[5577]: CRED_DISP pid=5577 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:33.058575 systemd[1]: sshd@10-172.31.25.13:22-139.178.89.65:51436.service: Deactivated successfully. Dec 13 14:50:33.060651 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:50:33.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.25.13:22-139.178.89.65:51436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:33.062652 systemd-logind[1732]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:50:33.063884 systemd-logind[1732]: Removed session 11. Dec 13 14:50:33.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.25.13:22-139.178.89.65:51448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:33.076497 systemd[1]: Started sshd@11-172.31.25.13:22-139.178.89.65:51448.service. Dec 13 14:50:33.258000 audit[5595]: USER_ACCT pid=5595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:33.260896 sshd[5595]: Accepted publickey for core from 139.178.89.65 port 51448 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:50:33.260000 audit[5595]: CRED_ACQ pid=5595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:33.260000 audit[5595]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc19f1750 a2=3 a3=0 items=0 ppid=1 pid=5595 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:33.260000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:50:33.262791 sshd[5595]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:50:33.268784 systemd[1]: Started session-12.scope. Dec 13 14:50:33.269243 systemd-logind[1732]: New session 12 of user core. Dec 13 14:50:33.273000 audit[5595]: USER_START pid=5595 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:33.275000 audit[5597]: CRED_ACQ pid=5597 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:33.706168 sshd[5595]: pam_unix(sshd:session): session closed for user core Dec 13 14:50:33.714000 audit[5595]: USER_END pid=5595 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:33.715000 audit[5595]: CRED_DISP pid=5595 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:33.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.25.13:22-139.178.89.65:51448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:33.718831 systemd[1]: sshd@11-172.31.25.13:22-139.178.89.65:51448.service: Deactivated successfully. Dec 13 14:50:33.721366 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:50:33.721859 systemd-logind[1732]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:50:33.735355 systemd[1]: Started sshd@12-172.31.25.13:22-139.178.89.65:51454.service. Dec 13 14:50:33.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.25.13:22-139.178.89.65:51454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:33.738836 systemd-logind[1732]: Removed session 12. Dec 13 14:50:33.930000 audit[5604]: USER_ACCT pid=5604 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:33.931934 sshd[5604]: Accepted publickey for core from 139.178.89.65 port 51454 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:50:33.931000 audit[5604]: CRED_ACQ pid=5604 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:33.931000 audit[5604]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff97a55090 a2=3 a3=0 items=0 ppid=1 pid=5604 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:33.931000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:50:33.934272 sshd[5604]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:50:33.940744 systemd-logind[1732]: New session 13 of user core. Dec 13 14:50:33.941384 systemd[1]: Started session-13.scope. Dec 13 14:50:33.945000 audit[5604]: USER_START pid=5604 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:33.947000 audit[5606]: CRED_ACQ pid=5606 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:34.175784 sshd[5604]: pam_unix(sshd:session): session closed for user core Dec 13 14:50:34.176000 audit[5604]: USER_END pid=5604 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:34.176000 audit[5604]: CRED_DISP pid=5604 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:34.179379 systemd[1]: sshd@12-172.31.25.13:22-139.178.89.65:51454.service: Deactivated successfully. Dec 13 14:50:34.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.25.13:22-139.178.89.65:51454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:34.180491 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:50:34.181195 systemd-logind[1732]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:50:34.182142 systemd-logind[1732]: Removed session 13. Dec 13 14:50:39.217606 systemd[1]: Started sshd@13-172.31.25.13:22-139.178.89.65:42622.service. Dec 13 14:50:39.219757 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 14:50:39.219820 kernel: audit: type=1130 audit(1734101439.216:1415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.25.13:22-139.178.89.65:42622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:39.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.25.13:22-139.178.89.65:42622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:39.453000 audit[5619]: USER_ACCT pid=5619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:39.455543 sshd[5619]: Accepted publickey for core from 139.178.89.65 port 42622 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:50:39.460346 kernel: audit: type=1101 audit(1734101439.453:1416): pid=5619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:39.459000 audit[5619]: CRED_ACQ pid=5619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:39.462750 sshd[5619]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:50:39.469992 kernel: audit: type=1103 audit(1734101439.459:1417): pid=5619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:39.470099 kernel: audit: type=1006 audit(1734101439.459:1418): pid=5619 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 14:50:39.470132 kernel: audit: type=1300 audit(1734101439.459:1418): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff32b79360 a2=3 a3=0 items=0 ppid=1 pid=5619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:39.459000 audit[5619]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff32b79360 a2=3 a3=0 items=0 ppid=1 pid=5619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:39.473209 systemd[1]: Started session-14.scope. Dec 13 14:50:39.476789 kernel: audit: type=1327 audit(1734101439.459:1418): proctitle=737368643A20636F7265205B707269765D Dec 13 14:50:39.459000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:50:39.475952 systemd-logind[1732]: New session 14 of user core. Dec 13 14:50:39.484000 audit[5619]: USER_START pid=5619 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:39.486000 audit[5621]: CRED_ACQ pid=5621 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:39.496001 kernel: audit: type=1105 audit(1734101439.484:1419): pid=5619 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:39.496103 kernel: audit: type=1103 audit(1734101439.486:1420): pid=5621 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:39.740394 sshd[5619]: pam_unix(sshd:session): session closed for user core Dec 13 14:50:39.741000 audit[5619]: USER_END pid=5619 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:39.744757 systemd[1]: sshd@13-172.31.25.13:22-139.178.89.65:42622.service: Deactivated successfully. Dec 13 14:50:39.745923 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:50:39.748332 kernel: audit: type=1106 audit(1734101439.741:1421): pid=5619 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:39.747564 systemd-logind[1732]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:50:39.741000 audit[5619]: CRED_DISP pid=5619 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:39.749250 systemd-logind[1732]: Removed session 14. Dec 13 14:50:39.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.25.13:22-139.178.89.65:42622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:39.753304 kernel: audit: type=1104 audit(1734101439.741:1422): pid=5619 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:44.768254 systemd[1]: Started sshd@14-172.31.25.13:22-139.178.89.65:42638.service. Dec 13 14:50:44.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.25.13:22-139.178.89.65:42638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:44.774671 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:50:44.775297 kernel: audit: type=1130 audit(1734101444.767:1424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.25.13:22-139.178.89.65:42638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:44.985000 audit[5659]: USER_ACCT pid=5659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:44.993638 kernel: audit: type=1101 audit(1734101444.985:1425): pid=5659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:44.993710 sshd[5659]: Accepted publickey for core from 139.178.89.65 port 42638 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:50:44.993000 audit[5659]: CRED_ACQ pid=5659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:44.997491 sshd[5659]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:50:45.003166 kernel: audit: type=1103 audit(1734101444.993:1426): pid=5659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:45.003299 kernel: audit: type=1006 audit(1734101444.993:1427): pid=5659 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 14:50:45.003473 kernel: audit: type=1300 audit(1734101444.993:1427): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3f153960 a2=3 a3=0 items=0 ppid=1 pid=5659 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:44.993000 audit[5659]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3f153960 a2=3 a3=0 items=0 ppid=1 pid=5659 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:44.993000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:50:45.009010 systemd[1]: Started session-15.scope. Dec 13 14:50:45.010421 kernel: audit: type=1327 audit(1734101444.993:1427): proctitle=737368643A20636F7265205B707269765D Dec 13 14:50:45.010515 systemd-logind[1732]: New session 15 of user core. Dec 13 14:50:45.019000 audit[5659]: USER_START pid=5659 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:45.027404 kernel: audit: type=1105 audit(1734101445.019:1428): pid=5659 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:45.024000 audit[5661]: CRED_ACQ pid=5661 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:45.032335 kernel: audit: type=1103 audit(1734101445.024:1429): pid=5661 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:45.279556 sshd[5659]: pam_unix(sshd:session): session closed for user core Dec 13 14:50:45.280000 audit[5659]: USER_END pid=5659 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:45.284307 systemd[1]: sshd@14-172.31.25.13:22-139.178.89.65:42638.service: Deactivated successfully. Dec 13 14:50:45.285527 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:50:45.287158 systemd-logind[1732]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:50:45.280000 audit[5659]: CRED_DISP pid=5659 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:45.289046 systemd-logind[1732]: Removed session 15. Dec 13 14:50:45.291390 kernel: audit: type=1106 audit(1734101445.280:1430): pid=5659 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:45.291470 kernel: audit: type=1104 audit(1734101445.280:1431): pid=5659 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:45.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.25.13:22-139.178.89.65:42638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:48.475979 systemd[1]: run-containerd-runc-k8s.io-1d0d16a6032d31fdf7db0e7ce18f5b77389b5f2cda9c7c91eef3bd069644aa2a-runc.rehYAh.mount: Deactivated successfully. Dec 13 14:50:50.310510 systemd[1]: Started sshd@15-172.31.25.13:22-139.178.89.65:56196.service. Dec 13 14:50:50.319095 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:50:50.319319 kernel: audit: type=1130 audit(1734101450.311:1433): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.25.13:22-139.178.89.65:56196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:50.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.25.13:22-139.178.89.65:56196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:50.502000 audit[5692]: USER_ACCT pid=5692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:50.510000 kernel: audit: type=1101 audit(1734101450.502:1434): pid=5692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:50.510053 kernel: audit: type=1103 audit(1734101450.508:1435): pid=5692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:50.508000 audit[5692]: CRED_ACQ pid=5692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:50.510159 sshd[5692]: Accepted publickey for core from 139.178.89.65 port 56196 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:50:50.510730 sshd[5692]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:50:50.518005 kernel: audit: type=1006 audit(1734101450.508:1436): pid=5692 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 14:50:50.518094 kernel: audit: type=1300 audit(1734101450.508:1436): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7a00ebd0 a2=3 a3=0 items=0 ppid=1 pid=5692 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:50.508000 audit[5692]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7a00ebd0 a2=3 a3=0 items=0 ppid=1 pid=5692 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:50.519925 systemd[1]: Started session-16.scope. Dec 13 14:50:50.521782 systemd-logind[1732]: New session 16 of user core. Dec 13 14:50:50.508000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:50:50.525321 kernel: audit: type=1327 audit(1734101450.508:1436): proctitle=737368643A20636F7265205B707269765D Dec 13 14:50:50.527000 audit[5692]: USER_START pid=5692 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:50.535299 kernel: audit: type=1105 audit(1734101450.527:1437): pid=5692 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:50.534000 audit[5694]: CRED_ACQ pid=5694 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:50.540292 kernel: audit: type=1103 audit(1734101450.534:1438): pid=5694 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:50.790257 sshd[5692]: pam_unix(sshd:session): session closed for user core Dec 13 14:50:50.791000 audit[5692]: USER_END pid=5692 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:50.795491 systemd[1]: sshd@15-172.31.25.13:22-139.178.89.65:56196.service: Deactivated successfully. Dec 13 14:50:50.796419 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:50:50.799293 kernel: audit: type=1106 audit(1734101450.791:1439): pid=5692 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:50.792000 audit[5692]: CRED_DISP pid=5692 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:50.801197 systemd-logind[1732]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:50:50.802232 systemd-logind[1732]: Removed session 16. Dec 13 14:50:50.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.25.13:22-139.178.89.65:56196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:50.804296 kernel: audit: type=1104 audit(1734101450.792:1440): pid=5692 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:55.825306 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:50:55.825435 kernel: audit: type=1130 audit(1734101455.818:1442): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.25.13:22-139.178.89.65:56206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:55.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.25.13:22-139.178.89.65:56206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:55.819402 systemd[1]: Started sshd@16-172.31.25.13:22-139.178.89.65:56206.service. Dec 13 14:50:55.990000 audit[5704]: USER_ACCT pid=5704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:55.992121 sshd[5704]: Accepted publickey for core from 139.178.89.65 port 56206 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:50:55.999311 kernel: audit: type=1101 audit(1734101455.990:1443): pid=5704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:55.998000 audit[5704]: CRED_ACQ pid=5704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:56.001096 sshd[5704]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:50:56.008152 kernel: audit: type=1103 audit(1734101455.998:1444): pid=5704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:56.008238 kernel: audit: type=1006 audit(1734101455.998:1445): pid=5704 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 14:50:55.998000 audit[5704]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec25a2610 a2=3 a3=0 items=0 ppid=1 pid=5704 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:55.998000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:50:56.018931 kernel: audit: type=1300 audit(1734101455.998:1445): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec25a2610 a2=3 a3=0 items=0 ppid=1 pid=5704 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:50:56.018994 kernel: audit: type=1327 audit(1734101455.998:1445): proctitle=737368643A20636F7265205B707269765D Dec 13 14:50:56.027852 systemd[1]: Started session-17.scope. Dec 13 14:50:56.028667 systemd-logind[1732]: New session 17 of user core. Dec 13 14:50:56.035000 audit[5704]: USER_START pid=5704 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:56.044220 kernel: audit: type=1105 audit(1734101456.035:1446): pid=5704 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:56.044337 kernel: audit: type=1103 audit(1734101456.042:1447): pid=5706 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:56.042000 audit[5706]: CRED_ACQ pid=5706 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:56.303204 sshd[5704]: pam_unix(sshd:session): session closed for user core Dec 13 14:50:56.305000 audit[5704]: USER_END pid=5704 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:56.305000 audit[5704]: CRED_DISP pid=5704 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:56.313406 systemd[1]: sshd@16-172.31.25.13:22-139.178.89.65:56206.service: Deactivated successfully. Dec 13 14:50:56.314331 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:50:56.316929 systemd-logind[1732]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:50:56.317485 kernel: audit: type=1106 audit(1734101456.305:1448): pid=5704 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:56.317612 kernel: audit: type=1104 audit(1734101456.305:1449): pid=5704 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:50:56.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.25.13:22-139.178.89.65:56206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:50:56.318373 systemd-logind[1732]: Removed session 17. Dec 13 14:51:01.253000 audit[4959]: AVC avc: denied { watch } for pid=4959 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_49_40.2120180835/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c443,c1017 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c443,c1017 tclass=file permissive=0 Dec 13 14:51:01.255067 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:51:01.255167 kernel: audit: type=1400 audit(1734101461.253:1451): avc: denied { watch } for pid=4959 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_49_40.2120180835/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c443,c1017 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c443,c1017 tclass=file permissive=0 Dec 13 14:51:01.253000 audit[4959]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001465b00 a2=fc6 a3=0 items=0 ppid=4440 pid=4959 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c443,c1017 key=(null) Dec 13 14:51:01.265893 kernel: audit: type=1300 audit(1734101461.253:1451): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001465b00 a2=fc6 a3=0 items=0 ppid=4440 pid=4959 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c443,c1017 key=(null) Dec 13 14:51:01.266020 kernel: audit: type=1327 audit(1734101461.253:1451): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:51:01.253000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:51:01.335239 systemd[1]: Started sshd@17-172.31.25.13:22-139.178.89.65:41814.service. Dec 13 14:51:01.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.25.13:22-139.178.89.65:41814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:01.340281 kernel: audit: type=1130 audit(1734101461.335:1452): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.25.13:22-139.178.89.65:41814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:01.538000 audit[5716]: USER_ACCT pid=5716 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:01.540477 sshd[5716]: Accepted publickey for core from 139.178.89.65 port 41814 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:51:01.543279 kernel: audit: type=1101 audit(1734101461.538:1453): pid=5716 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:01.543000 audit[5716]: CRED_ACQ pid=5716 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:01.544172 sshd[5716]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:51:01.550873 kernel: audit: type=1103 audit(1734101461.543:1454): pid=5716 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:01.550977 kernel: audit: type=1006 audit(1734101461.543:1455): pid=5716 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 14:51:01.551010 kernel: audit: type=1300 audit(1734101461.543:1455): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffde9604b0 a2=3 a3=0 items=0 ppid=1 pid=5716 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:01.543000 audit[5716]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffde9604b0 a2=3 a3=0 items=0 ppid=1 pid=5716 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:01.550410 systemd[1]: Started session-18.scope. Dec 13 14:51:01.552560 systemd-logind[1732]: New session 18 of user core. Dec 13 14:51:01.543000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:51:01.557550 kernel: audit: type=1327 audit(1734101461.543:1455): proctitle=737368643A20636F7265205B707269765D Dec 13 14:51:01.558000 audit[5716]: USER_START pid=5716 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:01.560000 audit[5718]: CRED_ACQ pid=5718 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:01.564306 kernel: audit: type=1105 audit(1734101461.558:1456): pid=5716 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:01.781517 sshd[5716]: pam_unix(sshd:session): session closed for user core Dec 13 14:51:01.782000 audit[5716]: USER_END pid=5716 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:01.783000 audit[5716]: CRED_DISP pid=5716 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:01.785527 systemd-logind[1732]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:51:01.787350 systemd[1]: sshd@17-172.31.25.13:22-139.178.89.65:41814.service: Deactivated successfully. Dec 13 14:51:01.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.25.13:22-139.178.89.65:41814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:01.788289 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:51:01.788853 systemd-logind[1732]: Removed session 18. Dec 13 14:51:01.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.25.13:22-139.178.89.65:41822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:01.807710 systemd[1]: Started sshd@18-172.31.25.13:22-139.178.89.65:41822.service. Dec 13 14:51:01.971000 audit[5728]: USER_ACCT pid=5728 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:01.972269 sshd[5728]: Accepted publickey for core from 139.178.89.65 port 41822 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:51:01.974000 audit[5728]: CRED_ACQ pid=5728 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:01.975000 audit[5728]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6c2143a0 a2=3 a3=0 items=0 ppid=1 pid=5728 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:01.975000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:51:01.977320 sshd[5728]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:51:01.998399 systemd-logind[1732]: New session 19 of user core. Dec 13 14:51:02.000847 systemd[1]: Started session-19.scope. Dec 13 14:51:02.010000 audit[5728]: USER_START pid=5728 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:02.013000 audit[5730]: CRED_ACQ pid=5730 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:02.823821 sshd[5728]: pam_unix(sshd:session): session closed for user core Dec 13 14:51:02.825000 audit[5728]: USER_END pid=5728 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:02.826000 audit[5728]: CRED_DISP pid=5728 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:02.833626 systemd[1]: sshd@18-172.31.25.13:22-139.178.89.65:41822.service: Deactivated successfully. Dec 13 14:51:02.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.25.13:22-139.178.89.65:41822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:02.834719 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:51:02.835867 systemd-logind[1732]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:51:02.837203 systemd-logind[1732]: Removed session 19. Dec 13 14:51:02.850805 systemd[1]: Started sshd@19-172.31.25.13:22-139.178.89.65:41838.service. Dec 13 14:51:02.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.25.13:22-139.178.89.65:41838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:03.043000 audit[5738]: USER_ACCT pid=5738 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:03.043693 sshd[5738]: Accepted publickey for core from 139.178.89.65 port 41838 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:51:03.044000 audit[5738]: CRED_ACQ pid=5738 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:03.044000 audit[5738]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9c785aa0 a2=3 a3=0 items=0 ppid=1 pid=5738 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:03.044000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:51:03.046515 sshd[5738]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:51:03.053041 systemd[1]: Started session-20.scope. Dec 13 14:51:03.053856 systemd-logind[1732]: New session 20 of user core. Dec 13 14:51:03.060000 audit[5738]: USER_START pid=5738 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:03.062000 audit[5740]: CRED_ACQ pid=5740 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:04.175000 audit[5037]: AVC avc: denied { watch } for pid=5037 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_49_40.3496681955/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c791 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c122,c791 tclass=file permissive=0 Dec 13 14:51:04.175000 audit[5037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d97ea0 a2=fc6 a3=0 items=0 ppid=4738 pid=5037 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c791 key=(null) Dec 13 14:51:04.175000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:51:05.996000 audit[5756]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=5756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:51:05.996000 audit[5756]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffdaa3cc050 a2=0 a3=7ffdaa3cc03c items=0 ppid=3063 pid=5756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:05.996000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:51:06.003000 audit[5756]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:51:06.003000 audit[5756]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdaa3cc050 a2=0 a3=0 items=0 ppid=3063 pid=5756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:06.003000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:51:06.023055 sshd[5738]: pam_unix(sshd:session): session closed for user core Dec 13 14:51:06.026000 audit[5759]: NETFILTER_CFG table=filter:125 family=2 entries=32 op=nft_register_rule pid=5759 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:51:06.026000 audit[5759]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffceef70360 a2=0 a3=7ffceef7034c items=0 ppid=3063 pid=5759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:06.026000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:51:06.031000 audit[5738]: USER_END pid=5738 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:06.031000 audit[5738]: CRED_DISP pid=5738 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:06.040119 systemd[1]: Started sshd@20-172.31.25.13:22-139.178.89.65:41852.service. Dec 13 14:51:06.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.25.13:22-139.178.89.65:41852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:06.046480 systemd[1]: sshd@19-172.31.25.13:22-139.178.89.65:41838.service: Deactivated successfully. Dec 13 14:51:06.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.25.13:22-139.178.89.65:41838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:06.048797 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:51:06.049852 systemd-logind[1732]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:51:06.053021 systemd-logind[1732]: Removed session 20. Dec 13 14:51:06.058000 audit[5759]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=5759 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:51:06.058000 audit[5759]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffceef70360 a2=0 a3=0 items=0 ppid=3063 pid=5759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:06.058000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:51:06.245000 audit[5761]: USER_ACCT pid=5761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:06.246512 sshd[5761]: Accepted publickey for core from 139.178.89.65 port 41852 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:51:06.247000 audit[5761]: CRED_ACQ pid=5761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:06.247000 audit[5761]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec5ef4830 a2=3 a3=0 items=0 ppid=1 pid=5761 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:06.247000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:51:06.250050 sshd[5761]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:51:06.255322 systemd-logind[1732]: New session 21 of user core. Dec 13 14:51:06.256366 systemd[1]: Started session-21.scope. Dec 13 14:51:06.264295 kernel: kauditd_printk_skb: 47 callbacks suppressed Dec 13 14:51:06.264382 kernel: audit: type=1105 audit(1734101466.261:1488): pid=5761 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:06.261000 audit[5761]: USER_START pid=5761 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:06.267000 audit[5764]: CRED_ACQ pid=5764 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:06.271924 kernel: audit: type=1103 audit(1734101466.267:1489): pid=5764 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:07.246376 sshd[5761]: pam_unix(sshd:session): session closed for user core Dec 13 14:51:07.247000 audit[5761]: USER_END pid=5761 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:07.253301 kernel: audit: type=1106 audit(1734101467.247:1490): pid=5761 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:07.250822 systemd-logind[1732]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:51:07.251747 systemd[1]: sshd@20-172.31.25.13:22-139.178.89.65:41852.service: Deactivated successfully. Dec 13 14:51:07.247000 audit[5761]: CRED_DISP pid=5761 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:07.252619 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:51:07.254084 systemd-logind[1732]: Removed session 21. Dec 13 14:51:07.262428 kernel: audit: type=1104 audit(1734101467.247:1491): pid=5761 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:07.262515 kernel: audit: type=1131 audit(1734101467.247:1492): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.25.13:22-139.178.89.65:41852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:07.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.25.13:22-139.178.89.65:41852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:07.272136 systemd[1]: Started sshd@21-172.31.25.13:22-139.178.89.65:41864.service. Dec 13 14:51:07.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.25.13:22-139.178.89.65:41864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:07.278312 kernel: audit: type=1130 audit(1734101467.272:1493): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.25.13:22-139.178.89.65:41864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:07.461000 audit[5772]: USER_ACCT pid=5772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:07.463524 sshd[5772]: Accepted publickey for core from 139.178.89.65 port 41864 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:51:07.466000 audit[5772]: CRED_ACQ pid=5772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:07.468637 sshd[5772]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:51:07.471225 kernel: audit: type=1101 audit(1734101467.461:1494): pid=5772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:07.471313 kernel: audit: type=1103 audit(1734101467.466:1495): pid=5772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:07.466000 audit[5772]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff105453c0 a2=3 a3=0 items=0 ppid=1 pid=5772 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:07.481025 kernel: audit: type=1006 audit(1734101467.466:1496): pid=5772 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Dec 13 14:51:07.481702 kernel: audit: type=1300 audit(1734101467.466:1496): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff105453c0 a2=3 a3=0 items=0 ppid=1 pid=5772 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:07.466000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:51:07.485329 systemd-logind[1732]: New session 22 of user core. Dec 13 14:51:07.485928 systemd[1]: Started session-22.scope. Dec 13 14:51:07.495000 audit[5772]: USER_START pid=5772 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:07.498000 audit[5774]: CRED_ACQ pid=5774 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:07.521000 audit[2499]: AVC avc: denied { watch } for pid=2499 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:51:07.521000 audit[2499]: AVC avc: denied { watch } for pid=2499 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:51:07.521000 audit[2499]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00209ce40 a2=fc6 a3=0 items=0 ppid=2350 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:51:07.521000 audit[2499]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00203be60 a2=fc6 a3=0 items=0 ppid=2350 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:51:07.521000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:51:07.521000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:51:07.728228 sshd[5772]: pam_unix(sshd:session): session closed for user core Dec 13 14:51:07.729000 audit[5772]: USER_END pid=5772 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:07.729000 audit[5772]: CRED_DISP pid=5772 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:07.732105 systemd-logind[1732]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:51:07.734617 systemd[1]: sshd@21-172.31.25.13:22-139.178.89.65:41864.service: Deactivated successfully. Dec 13 14:51:07.735772 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:51:07.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.25.13:22-139.178.89.65:41864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:07.737543 systemd-logind[1732]: Removed session 22. Dec 13 14:51:08.866000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:51:08.866000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:51:08.866000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00f7a9710 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:51:08.866000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:51:08.866000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c01691f300 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:51:08.866000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:51:08.868000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:51:08.869000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:51:08.869000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c01687fb60 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:51:08.869000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:51:08.868000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00f7a9770 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:51:08.868000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:51:08.889000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:51:08.889000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:51:08.889000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c016877000 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:51:08.889000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:51:08.889000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c01687fc80 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:51:08.889000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:51:12.757555 systemd[1]: Started sshd@22-172.31.25.13:22-139.178.89.65:33674.service. Dec 13 14:51:12.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.25.13:22-139.178.89.65:33674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:12.759369 kernel: kauditd_printk_skb: 30 callbacks suppressed Dec 13 14:51:12.759528 kernel: audit: type=1130 audit(1734101472.758:1510): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.25.13:22-139.178.89.65:33674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:12.945000 audit[5789]: USER_ACCT pid=5789 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:12.947000 audit[5789]: CRED_ACQ pid=5789 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:12.951299 sshd[5789]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:51:12.954900 sshd[5789]: Accepted publickey for core from 139.178.89.65 port 33674 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:51:12.956084 kernel: audit: type=1101 audit(1734101472.945:1511): pid=5789 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:12.956158 kernel: audit: type=1103 audit(1734101472.947:1512): pid=5789 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:12.956535 kernel: audit: type=1006 audit(1734101472.947:1513): pid=5789 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 14:51:12.947000 audit[5789]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6803c450 a2=3 a3=0 items=0 ppid=1 pid=5789 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:12.966803 kernel: audit: type=1300 audit(1734101472.947:1513): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6803c450 a2=3 a3=0 items=0 ppid=1 pid=5789 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:12.966891 kernel: audit: type=1327 audit(1734101472.947:1513): proctitle=737368643A20636F7265205B707269765D Dec 13 14:51:12.947000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:51:12.962132 systemd[1]: Started session-23.scope. Dec 13 14:51:12.965661 systemd-logind[1732]: New session 23 of user core. Dec 13 14:51:12.972000 audit[5789]: USER_START pid=5789 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:12.972000 audit[5791]: CRED_ACQ pid=5791 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:12.983670 kernel: audit: type=1105 audit(1734101472.972:1514): pid=5789 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:12.983865 kernel: audit: type=1103 audit(1734101472.972:1515): pid=5791 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:13.185283 sshd[5789]: pam_unix(sshd:session): session closed for user core Dec 13 14:51:13.186000 audit[5789]: USER_END pid=5789 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:13.189415 systemd[1]: sshd@22-172.31.25.13:22-139.178.89.65:33674.service: Deactivated successfully. Dec 13 14:51:13.190337 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 14:51:13.192354 kernel: audit: type=1106 audit(1734101473.186:1516): pid=5789 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:13.186000 audit[5789]: CRED_DISP pid=5789 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:13.193131 systemd-logind[1732]: Session 23 logged out. Waiting for processes to exit. Dec 13 14:51:13.200076 kernel: audit: type=1104 audit(1734101473.186:1517): pid=5789 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:13.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.25.13:22-139.178.89.65:33674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:13.200309 systemd-logind[1732]: Removed session 23. Dec 13 14:51:13.499537 systemd[1]: run-containerd-runc-k8s.io-94db4d3ba450f57d79f668c14fc186d8b37c8b48aa2064ae80f86fe82b3454ae-runc.cOmIVT.mount: Deactivated successfully. Dec 13 14:51:13.818000 audit[2499]: AVC avc: denied { watch } for pid=2499 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:51:13.818000 audit[2499]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001bb33e0 a2=fc6 a3=0 items=0 ppid=2350 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:51:13.818000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:51:13.822000 audit[2499]: AVC avc: denied { watch } for pid=2499 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:51:13.822000 audit[2499]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001bb3400 a2=fc6 a3=0 items=0 ppid=2350 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:51:13.822000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:51:13.847000 audit[2499]: AVC avc: denied { watch } for pid=2499 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:51:13.847000 audit[2499]: AVC avc: denied { watch } for pid=2499 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:51:13.847000 audit[2499]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001bb3b20 a2=fc6 a3=0 items=0 ppid=2350 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:51:13.847000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:51:13.847000 audit[2499]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0021686e0 a2=fc6 a3=0 items=0 ppid=2350 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:51:13.847000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:51:14.115000 audit[5825]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=5825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:51:14.115000 audit[5825]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffb1634b80 a2=0 a3=7fffb1634b6c items=0 ppid=3063 pid=5825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:14.115000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:51:14.126000 audit[5825]: NETFILTER_CFG table=nat:128 family=2 entries=106 op=nft_register_chain pid=5825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:51:14.126000 audit[5825]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffb1634b80 a2=0 a3=7fffb1634b6c items=0 ppid=3063 pid=5825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:14.126000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:51:18.211095 systemd[1]: Started sshd@23-172.31.25.13:22-139.178.89.65:52880.service. Dec 13 14:51:18.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.25.13:22-139.178.89.65:52880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:18.213164 kernel: kauditd_printk_skb: 19 callbacks suppressed Dec 13 14:51:18.213247 kernel: audit: type=1130 audit(1734101478.210:1525): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.25.13:22-139.178.89.65:52880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:18.435332 kernel: audit: type=1101 audit(1734101478.425:1526): pid=5828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:18.435468 kernel: audit: type=1103 audit(1734101478.425:1527): pid=5828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:18.425000 audit[5828]: USER_ACCT pid=5828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:18.425000 audit[5828]: CRED_ACQ pid=5828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:18.433096 sshd[5828]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:51:18.436029 sshd[5828]: Accepted publickey for core from 139.178.89.65 port 52880 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:51:18.447090 kernel: audit: type=1006 audit(1734101478.425:1528): pid=5828 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 14:51:18.449809 kernel: audit: type=1300 audit(1734101478.425:1528): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc282dff40 a2=3 a3=0 items=0 ppid=1 pid=5828 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:18.449894 kernel: audit: type=1327 audit(1734101478.425:1528): proctitle=737368643A20636F7265205B707269765D Dec 13 14:51:18.425000 audit[5828]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc282dff40 a2=3 a3=0 items=0 ppid=1 pid=5828 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:18.425000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:51:18.452749 systemd-logind[1732]: New session 24 of user core. Dec 13 14:51:18.453128 systemd[1]: Started session-24.scope. Dec 13 14:51:18.507137 kernel: audit: type=1105 audit(1734101478.495:1529): pid=5828 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:18.495000 audit[5828]: USER_START pid=5828 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:18.519989 kernel: audit: type=1103 audit(1734101478.509:1530): pid=5847 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:18.509000 audit[5847]: CRED_ACQ pid=5847 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:18.742572 sshd[5828]: pam_unix(sshd:session): session closed for user core Dec 13 14:51:18.743000 audit[5828]: USER_END pid=5828 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:18.743000 audit[5828]: CRED_DISP pid=5828 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:18.749735 systemd[1]: sshd@23-172.31.25.13:22-139.178.89.65:52880.service: Deactivated successfully. Dec 13 14:51:18.750815 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 14:51:18.752964 systemd-logind[1732]: Session 24 logged out. Waiting for processes to exit. Dec 13 14:51:18.755024 kernel: audit: type=1106 audit(1734101478.743:1531): pid=5828 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:18.755104 kernel: audit: type=1104 audit(1734101478.743:1532): pid=5828 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:18.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.25.13:22-139.178.89.65:52880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:18.754420 systemd-logind[1732]: Removed session 24. Dec 13 14:51:19.364708 amazon-ssm-agent[1717]: 2024-12-13 14:51:19 INFO [HealthCheck] HealthCheck reporting agent health. Dec 13 14:51:22.220952 systemd[1]: run-containerd-runc-k8s.io-1d0d16a6032d31fdf7db0e7ce18f5b77389b5f2cda9c7c91eef3bd069644aa2a-runc.sG421j.mount: Deactivated successfully. Dec 13 14:51:23.769909 systemd[1]: Started sshd@24-172.31.25.13:22-139.178.89.65:52892.service. Dec 13 14:51:23.771540 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:51:23.771613 kernel: audit: type=1130 audit(1734101483.768:1534): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.25.13:22-139.178.89.65:52892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:23.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.25.13:22-139.178.89.65:52892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:23.967000 audit[5881]: USER_ACCT pid=5881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:23.973618 kernel: audit: type=1101 audit(1734101483.967:1535): pid=5881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:23.979088 kernel: audit: type=1103 audit(1734101483.973:1536): pid=5881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:23.973000 audit[5881]: CRED_ACQ pid=5881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:23.979344 sshd[5881]: Accepted publickey for core from 139.178.89.65 port 52892 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:51:23.974989 sshd[5881]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:51:23.981995 systemd[1]: Started session-25.scope. Dec 13 14:51:23.983310 kernel: audit: type=1006 audit(1734101483.973:1537): pid=5881 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 14:51:23.973000 audit[5881]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe6d01e30 a2=3 a3=0 items=0 ppid=1 pid=5881 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:23.983861 systemd-logind[1732]: New session 25 of user core. Dec 13 14:51:23.989780 kernel: audit: type=1300 audit(1734101483.973:1537): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe6d01e30 a2=3 a3=0 items=0 ppid=1 pid=5881 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:23.989856 kernel: audit: type=1327 audit(1734101483.973:1537): proctitle=737368643A20636F7265205B707269765D Dec 13 14:51:23.973000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:51:23.990000 audit[5881]: USER_START pid=5881 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:23.993000 audit[5883]: CRED_ACQ pid=5883 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:24.008441 kernel: audit: type=1105 audit(1734101483.990:1538): pid=5881 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:24.008901 kernel: audit: type=1103 audit(1734101483.993:1539): pid=5883 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:24.220136 sshd[5881]: pam_unix(sshd:session): session closed for user core Dec 13 14:51:24.220000 audit[5881]: USER_END pid=5881 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:24.225046 systemd-logind[1732]: Session 25 logged out. Waiting for processes to exit. Dec 13 14:51:24.221000 audit[5881]: CRED_DISP pid=5881 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:24.227175 systemd[1]: sshd@24-172.31.25.13:22-139.178.89.65:52892.service: Deactivated successfully. Dec 13 14:51:24.228242 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 14:51:24.231498 systemd-logind[1732]: Removed session 25. Dec 13 14:51:24.233173 kernel: audit: type=1106 audit(1734101484.220:1540): pid=5881 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:24.233339 kernel: audit: type=1104 audit(1734101484.221:1541): pid=5881 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:24.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.25.13:22-139.178.89.65:52892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:29.250069 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:51:29.250381 kernel: audit: type=1130 audit(1734101489.246:1543): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.25.13:22-139.178.89.65:58996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:29.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.25.13:22-139.178.89.65:58996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:29.247565 systemd[1]: Started sshd@25-172.31.25.13:22-139.178.89.65:58996.service. Dec 13 14:51:29.407000 audit[5908]: USER_ACCT pid=5908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:29.414108 sshd[5908]: Accepted publickey for core from 139.178.89.65 port 58996 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:51:29.414545 kernel: audit: type=1101 audit(1734101489.407:1544): pid=5908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:29.415608 kernel: audit: type=1103 audit(1734101489.413:1545): pid=5908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:29.413000 audit[5908]: CRED_ACQ pid=5908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:29.415031 sshd[5908]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:51:29.422985 kernel: audit: type=1006 audit(1734101489.413:1546): pid=5908 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 14:51:29.423060 kernel: audit: type=1300 audit(1734101489.413:1546): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff62f0c5b0 a2=3 a3=0 items=0 ppid=1 pid=5908 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:29.413000 audit[5908]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff62f0c5b0 a2=3 a3=0 items=0 ppid=1 pid=5908 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:29.422598 systemd[1]: Started session-26.scope. Dec 13 14:51:29.426707 systemd-logind[1732]: New session 26 of user core. Dec 13 14:51:29.413000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:51:29.431279 kernel: audit: type=1327 audit(1734101489.413:1546): proctitle=737368643A20636F7265205B707269765D Dec 13 14:51:29.434000 audit[5908]: USER_START pid=5908 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:29.441392 kernel: audit: type=1105 audit(1734101489.434:1547): pid=5908 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:29.440000 audit[5910]: CRED_ACQ pid=5910 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:29.446285 kernel: audit: type=1103 audit(1734101489.440:1548): pid=5910 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:29.618774 sshd[5908]: pam_unix(sshd:session): session closed for user core Dec 13 14:51:29.619000 audit[5908]: USER_END pid=5908 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:29.623622 systemd[1]: sshd@25-172.31.25.13:22-139.178.89.65:58996.service: Deactivated successfully. Dec 13 14:51:29.624609 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 14:51:29.626114 systemd-logind[1732]: Session 26 logged out. Waiting for processes to exit. Dec 13 14:51:29.619000 audit[5908]: CRED_DISP pid=5908 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:29.627745 systemd-logind[1732]: Removed session 26. Dec 13 14:51:29.630905 kernel: audit: type=1106 audit(1734101489.619:1549): pid=5908 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:29.631611 kernel: audit: type=1104 audit(1734101489.619:1550): pid=5908 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:29.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.25.13:22-139.178.89.65:58996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:34.649280 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:51:34.649474 kernel: audit: type=1130 audit(1734101494.645:1552): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.25.13:22-139.178.89.65:59004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:34.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.25.13:22-139.178.89.65:59004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:34.646486 systemd[1]: Started sshd@26-172.31.25.13:22-139.178.89.65:59004.service. Dec 13 14:51:34.812000 audit[5920]: USER_ACCT pid=5920 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:34.824343 kernel: audit: type=1101 audit(1734101494.812:1553): pid=5920 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:34.824417 kernel: audit: type=1103 audit(1734101494.818:1554): pid=5920 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:34.818000 audit[5920]: CRED_ACQ pid=5920 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:34.824609 sshd[5920]: Accepted publickey for core from 139.178.89.65 port 59004 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:51:34.820143 sshd[5920]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:51:34.828436 kernel: audit: type=1006 audit(1734101494.818:1555): pid=5920 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 14:51:34.826956 systemd[1]: Started session-27.scope. Dec 13 14:51:34.818000 audit[5920]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf317cc90 a2=3 a3=0 items=0 ppid=1 pid=5920 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:34.836641 kernel: audit: type=1300 audit(1734101494.818:1555): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf317cc90 a2=3 a3=0 items=0 ppid=1 pid=5920 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:34.828360 systemd-logind[1732]: New session 27 of user core. Dec 13 14:51:34.818000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:51:34.839364 kernel: audit: type=1327 audit(1734101494.818:1555): proctitle=737368643A20636F7265205B707269765D Dec 13 14:51:34.835000 audit[5920]: USER_START pid=5920 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:34.838000 audit[5922]: CRED_ACQ pid=5922 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:34.845363 kernel: audit: type=1105 audit(1734101494.835:1556): pid=5920 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:34.845410 kernel: audit: type=1103 audit(1734101494.838:1557): pid=5922 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:35.026435 sshd[5920]: pam_unix(sshd:session): session closed for user core Dec 13 14:51:35.026000 audit[5920]: USER_END pid=5920 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:35.026000 audit[5920]: CRED_DISP pid=5920 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:35.033513 systemd[1]: sshd@26-172.31.25.13:22-139.178.89.65:59004.service: Deactivated successfully. Dec 13 14:51:35.034453 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 14:51:35.036956 kernel: audit: type=1106 audit(1734101495.026:1558): pid=5920 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:35.037028 kernel: audit: type=1104 audit(1734101495.026:1559): pid=5920 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:35.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.25.13:22-139.178.89.65:59004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:35.036488 systemd-logind[1732]: Session 27 logged out. Waiting for processes to exit. Dec 13 14:51:35.037716 systemd-logind[1732]: Removed session 27. Dec 13 14:51:40.055208 systemd[1]: Started sshd@27-172.31.25.13:22-139.178.89.65:52306.service. Dec 13 14:51:40.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.25.13:22-139.178.89.65:52306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:40.058232 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:51:40.058325 kernel: audit: type=1130 audit(1734101500.054:1561): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.25.13:22-139.178.89.65:52306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:40.257000 audit[5933]: USER_ACCT pid=5933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:40.263705 sshd[5933]: Accepted publickey for core from 139.178.89.65 port 52306 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:51:40.262000 audit[5933]: CRED_ACQ pid=5933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:40.265476 sshd[5933]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:51:40.269021 kernel: audit: type=1101 audit(1734101500.257:1562): pid=5933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:40.269096 kernel: audit: type=1103 audit(1734101500.262:1563): pid=5933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:40.262000 audit[5933]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc96eeb860 a2=3 a3=0 items=0 ppid=1 pid=5933 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:40.279245 kernel: audit: type=1006 audit(1734101500.262:1564): pid=5933 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Dec 13 14:51:40.279354 kernel: audit: type=1300 audit(1734101500.262:1564): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc96eeb860 a2=3 a3=0 items=0 ppid=1 pid=5933 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:40.279383 kernel: audit: type=1327 audit(1734101500.262:1564): proctitle=737368643A20636F7265205B707269765D Dec 13 14:51:40.262000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:51:40.281879 systemd[1]: Started session-28.scope. Dec 13 14:51:40.283332 systemd-logind[1732]: New session 28 of user core. Dec 13 14:51:40.290000 audit[5933]: USER_START pid=5933 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:40.300323 kernel: audit: type=1105 audit(1734101500.290:1565): pid=5933 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:40.298000 audit[5935]: CRED_ACQ pid=5935 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:40.306296 kernel: audit: type=1103 audit(1734101500.298:1566): pid=5935 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:40.497140 sshd[5933]: pam_unix(sshd:session): session closed for user core Dec 13 14:51:40.497000 audit[5933]: USER_END pid=5933 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:40.501044 systemd[1]: sshd@27-172.31.25.13:22-139.178.89.65:52306.service: Deactivated successfully. Dec 13 14:51:40.501997 systemd[1]: session-28.scope: Deactivated successfully. Dec 13 14:51:40.503324 systemd-logind[1732]: Session 28 logged out. Waiting for processes to exit. Dec 13 14:51:40.497000 audit[5933]: CRED_DISP pid=5933 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:40.504870 systemd-logind[1732]: Removed session 28. Dec 13 14:51:40.508430 kernel: audit: type=1106 audit(1734101500.497:1567): pid=5933 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:40.508514 kernel: audit: type=1104 audit(1734101500.497:1568): pid=5933 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:40.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.25.13:22-139.178.89.65:52306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:43.482293 systemd[1]: run-containerd-runc-k8s.io-94db4d3ba450f57d79f668c14fc186d8b37c8b48aa2064ae80f86fe82b3454ae-runc.kaDKz5.mount: Deactivated successfully. Dec 13 14:51:45.535532 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:51:45.535670 kernel: audit: type=1130 audit(1734101505.529:1570): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.25.13:22-139.178.89.65:52320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:45.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.25.13:22-139.178.89.65:52320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:45.530440 systemd[1]: Started sshd@28-172.31.25.13:22-139.178.89.65:52320.service. Dec 13 14:51:45.701000 audit[5970]: USER_ACCT pid=5970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:45.703211 sshd[5970]: Accepted publickey for core from 139.178.89.65 port 52320 ssh2: RSA SHA256:PM2WEhaZS3v01Arr0DElq2Q1hZw48aAPkomIiU0Ib78 Dec 13 14:51:45.712665 kernel: audit: type=1101 audit(1734101505.701:1571): pid=5970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:45.712785 kernel: audit: type=1103 audit(1734101505.706:1572): pid=5970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:45.706000 audit[5970]: CRED_ACQ pid=5970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:45.708661 sshd[5970]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:51:45.715783 kernel: audit: type=1006 audit(1734101505.706:1573): pid=5970 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Dec 13 14:51:45.720770 kernel: audit: type=1300 audit(1734101505.706:1573): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1e420950 a2=3 a3=0 items=0 ppid=1 pid=5970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:45.706000 audit[5970]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1e420950 a2=3 a3=0 items=0 ppid=1 pid=5970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:51:45.718510 systemd[1]: Started session-29.scope. Dec 13 14:51:45.720436 systemd-logind[1732]: New session 29 of user core. Dec 13 14:51:45.706000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:51:45.724286 kernel: audit: type=1327 audit(1734101505.706:1573): proctitle=737368643A20636F7265205B707269765D Dec 13 14:51:45.725000 audit[5970]: USER_START pid=5970 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:45.725000 audit[5973]: CRED_ACQ pid=5973 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:45.735946 kernel: audit: type=1105 audit(1734101505.725:1574): pid=5970 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:45.736017 kernel: audit: type=1103 audit(1734101505.725:1575): pid=5973 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:45.935463 sshd[5970]: pam_unix(sshd:session): session closed for user core Dec 13 14:51:45.943280 kernel: audit: type=1106 audit(1734101505.935:1576): pid=5970 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:45.935000 audit[5970]: USER_END pid=5970 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:45.939013 systemd[1]: sshd@28-172.31.25.13:22-139.178.89.65:52320.service: Deactivated successfully. Dec 13 14:51:45.940077 systemd[1]: session-29.scope: Deactivated successfully. Dec 13 14:51:45.943586 systemd-logind[1732]: Session 29 logged out. Waiting for processes to exit. Dec 13 14:51:45.949563 kernel: audit: type=1104 audit(1734101505.935:1577): pid=5970 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:45.935000 audit[5970]: CRED_DISP pid=5970 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:51:45.949079 systemd-logind[1732]: Removed session 29. Dec 13 14:51:45.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.25.13:22-139.178.89.65:52320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:51:48.476715 systemd[1]: run-containerd-runc-k8s.io-1d0d16a6032d31fdf7db0e7ce18f5b77389b5f2cda9c7c91eef3bd069644aa2a-runc.wjDg8i.mount: Deactivated successfully. Dec 13 14:51:59.391359 systemd[1]: cri-containerd-48b0a03a993b18b2ec2d6080086d696d845ec95059cbbce5ac73949bc2ffceb9.scope: Deactivated successfully. Dec 13 14:51:59.391679 systemd[1]: cri-containerd-48b0a03a993b18b2ec2d6080086d696d845ec95059cbbce5ac73949bc2ffceb9.scope: Consumed 3.054s CPU time. Dec 13 14:51:59.402713 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:51:59.402819 kernel: audit: type=1334 audit(1734101519.394:1579): prog-id=78 op=UNLOAD Dec 13 14:51:59.402846 kernel: audit: type=1334 audit(1734101519.394:1580): prog-id=99 op=UNLOAD Dec 13 14:51:59.394000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:51:59.394000 audit: BPF prog-id=99 op=UNLOAD Dec 13 14:51:59.438152 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-48b0a03a993b18b2ec2d6080086d696d845ec95059cbbce5ac73949bc2ffceb9-rootfs.mount: Deactivated successfully. Dec 13 14:51:59.441399 env[1768]: time="2024-12-13T14:51:59.441330997Z" level=info msg="shim disconnected" id=48b0a03a993b18b2ec2d6080086d696d845ec95059cbbce5ac73949bc2ffceb9 Dec 13 14:51:59.441838 env[1768]: time="2024-12-13T14:51:59.441398932Z" level=warning msg="cleaning up after shim disconnected" id=48b0a03a993b18b2ec2d6080086d696d845ec95059cbbce5ac73949bc2ffceb9 namespace=k8s.io Dec 13 14:51:59.441838 env[1768]: time="2024-12-13T14:51:59.441415094Z" level=info msg="cleaning up dead shim" Dec 13 14:51:59.450571 env[1768]: time="2024-12-13T14:51:59.450474856Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:51:59Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6014 runtime=io.containerd.runc.v2\n" Dec 13 14:52:00.161693 systemd[1]: cri-containerd-a110282834ad59944db80a3450d6db83840e30ae0cc851ddb1a476cb2176d155.scope: Deactivated successfully. Dec 13 14:52:00.162781 systemd[1]: cri-containerd-a110282834ad59944db80a3450d6db83840e30ae0cc851ddb1a476cb2176d155.scope: Consumed 3.621s CPU time. Dec 13 14:52:00.161000 audit: BPF prog-id=114 op=UNLOAD Dec 13 14:52:00.165322 kernel: audit: type=1334 audit(1734101520.161:1581): prog-id=114 op=UNLOAD Dec 13 14:52:00.167000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:52:00.171407 kernel: audit: type=1334 audit(1734101520.167:1582): prog-id=117 op=UNLOAD Dec 13 14:52:00.199519 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a110282834ad59944db80a3450d6db83840e30ae0cc851ddb1a476cb2176d155-rootfs.mount: Deactivated successfully. Dec 13 14:52:00.205954 env[1768]: time="2024-12-13T14:52:00.205905466Z" level=info msg="shim disconnected" id=a110282834ad59944db80a3450d6db83840e30ae0cc851ddb1a476cb2176d155 Dec 13 14:52:00.207460 env[1768]: time="2024-12-13T14:52:00.205975169Z" level=warning msg="cleaning up after shim disconnected" id=a110282834ad59944db80a3450d6db83840e30ae0cc851ddb1a476cb2176d155 namespace=k8s.io Dec 13 14:52:00.207460 env[1768]: time="2024-12-13T14:52:00.207093845Z" level=info msg="cleaning up dead shim" Dec 13 14:52:00.218321 env[1768]: time="2024-12-13T14:52:00.218174883Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:52:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6040 runtime=io.containerd.runc.v2\n" Dec 13 14:52:00.264633 kubelet[2628]: I1213 14:52:00.264595 2628 scope.go:117] "RemoveContainer" containerID="48b0a03a993b18b2ec2d6080086d696d845ec95059cbbce5ac73949bc2ffceb9" Dec 13 14:52:00.265241 kubelet[2628]: I1213 14:52:00.265215 2628 scope.go:117] "RemoveContainer" containerID="a110282834ad59944db80a3450d6db83840e30ae0cc851ddb1a476cb2176d155" Dec 13 14:52:00.281210 env[1768]: time="2024-12-13T14:52:00.281159212Z" level=info msg="CreateContainer within sandbox \"0e4e2e00a068cd3e92327212acd87bcc3875ada9f10b69264ed2f4d10c79dd50\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Dec 13 14:52:00.281540 env[1768]: time="2024-12-13T14:52:00.281489197Z" level=info msg="CreateContainer within sandbox \"0dc8c117d9d8afbf31cb326df41d99875a947e99d8a969d4be2dfa736303fc76\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Dec 13 14:52:00.308772 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1948297990.mount: Deactivated successfully. Dec 13 14:52:00.321965 env[1768]: time="2024-12-13T14:52:00.321919006Z" level=info msg="CreateContainer within sandbox \"0e4e2e00a068cd3e92327212acd87bcc3875ada9f10b69264ed2f4d10c79dd50\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"e4e371d3b25e0c3f7a9cc2cea125ab56c841afed6bc6fa2a19ced7f78a19f6dc\"" Dec 13 14:52:00.322743 env[1768]: time="2024-12-13T14:52:00.322665841Z" level=info msg="StartContainer for \"e4e371d3b25e0c3f7a9cc2cea125ab56c841afed6bc6fa2a19ced7f78a19f6dc\"" Dec 13 14:52:00.328833 env[1768]: time="2024-12-13T14:52:00.328656108Z" level=info msg="CreateContainer within sandbox \"0dc8c117d9d8afbf31cb326df41d99875a947e99d8a969d4be2dfa736303fc76\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"def7b5390365df4d8eae9ca92594cc1e58dcb126119f03385fd1f0bc722dd638\"" Dec 13 14:52:00.330043 env[1768]: time="2024-12-13T14:52:00.330018912Z" level=info msg="StartContainer for \"def7b5390365df4d8eae9ca92594cc1e58dcb126119f03385fd1f0bc722dd638\"" Dec 13 14:52:00.349776 systemd[1]: Started cri-containerd-e4e371d3b25e0c3f7a9cc2cea125ab56c841afed6bc6fa2a19ced7f78a19f6dc.scope. Dec 13 14:52:00.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.381623 systemd[1]: Started cri-containerd-def7b5390365df4d8eae9ca92594cc1e58dcb126119f03385fd1f0bc722dd638.scope. Dec 13 14:52:00.396592 kernel: audit: type=1400 audit(1734101520.387:1583): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396695 kernel: audit: type=1400 audit(1734101520.387:1584): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.405739 kernel: audit: type=1400 audit(1734101520.395:1585): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.405818 kernel: audit: type=1400 audit(1734101520.395:1586): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.411522 kernel: audit: type=1400 audit(1734101520.395:1587): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.418279 kernel: audit: type=1400 audit(1734101520.395:1588): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.395000 audit: BPF prog-id=208 op=LOAD Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3009 pid=6063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:52:00.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534653337316433623235653063336637613963633263656131323561 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3009 pid=6063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:52:00.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534653337316433623235653063336637613963633263656131323561 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit: BPF prog-id=209 op=LOAD Dec 13 14:52:00.396000 audit[6063]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000388370 items=0 ppid=3009 pid=6063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:52:00.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534653337316433623235653063336637613963633263656131323561 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit: BPF prog-id=210 op=LOAD Dec 13 14:52:00.396000 audit[6063]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003883b8 items=0 ppid=3009 pid=6063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:52:00.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534653337316433623235653063336637613963633263656131323561 Dec 13 14:52:00.396000 audit: BPF prog-id=210 op=UNLOAD Dec 13 14:52:00.396000 audit: BPF prog-id=209 op=UNLOAD Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { perfmon } for pid=6063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit[6063]: AVC avc: denied { bpf } for pid=6063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.396000 audit: BPF prog-id=211 op=LOAD Dec 13 14:52:00.396000 audit[6063]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003887c8 items=0 ppid=3009 pid=6063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:52:00.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534653337316433623235653063336637613963633263656131323561 Dec 13 14:52:00.441965 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2080097451.mount: Deactivated successfully. Dec 13 14:52:00.463664 env[1768]: time="2024-12-13T14:52:00.463614274Z" level=info msg="StartContainer for \"e4e371d3b25e0c3f7a9cc2cea125ab56c841afed6bc6fa2a19ced7f78a19f6dc\" returns successfully" Dec 13 14:52:00.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.468000 audit: BPF prog-id=212 op=LOAD Dec 13 14:52:00.470000 audit[6079]: AVC avc: denied { bpf } for pid=6079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.470000 audit[6079]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2350 pid=6079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:52:00.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465663762353339303336356466346438656165396361393235393463 Dec 13 14:52:00.470000 audit[6079]: AVC avc: denied { perfmon } for pid=6079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.470000 audit[6079]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2350 pid=6079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:52:00.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465663762353339303336356466346438656165396361393235393463 Dec 13 14:52:00.470000 audit[6079]: AVC avc: denied { bpf } for pid=6079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.470000 audit[6079]: AVC avc: denied { bpf } for pid=6079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.470000 audit[6079]: AVC avc: denied { bpf } for pid=6079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.470000 audit[6079]: AVC avc: denied { perfmon } for pid=6079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.470000 audit[6079]: AVC avc: denied { perfmon } for pid=6079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.470000 audit[6079]: AVC avc: denied { perfmon } for pid=6079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.470000 audit[6079]: AVC avc: denied { perfmon } for pid=6079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.470000 audit[6079]: AVC avc: denied { perfmon } for pid=6079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.470000 audit[6079]: AVC avc: denied { bpf } for pid=6079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.470000 audit[6079]: AVC avc: denied { bpf } for pid=6079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.470000 audit: BPF prog-id=213 op=LOAD Dec 13 14:52:00.470000 audit[6079]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c8260 items=0 ppid=2350 pid=6079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:52:00.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465663762353339303336356466346438656165396361393235393463 Dec 13 14:52:00.471000 audit[6079]: AVC avc: denied { bpf } for pid=6079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.471000 audit[6079]: AVC avc: denied { bpf } for pid=6079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.471000 audit[6079]: AVC avc: denied { perfmon } for pid=6079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.471000 audit[6079]: AVC avc: denied { perfmon } for pid=6079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.471000 audit[6079]: AVC avc: denied { perfmon } for pid=6079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.471000 audit[6079]: AVC avc: denied { perfmon } for pid=6079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.471000 audit[6079]: AVC avc: denied { perfmon } for pid=6079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.471000 audit[6079]: AVC avc: denied { bpf } for pid=6079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.471000 audit[6079]: AVC avc: denied { bpf } for pid=6079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.471000 audit: BPF prog-id=214 op=LOAD Dec 13 14:52:00.471000 audit[6079]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c82a8 items=0 ppid=2350 pid=6079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:52:00.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465663762353339303336356466346438656165396361393235393463 Dec 13 14:52:00.471000 audit: BPF prog-id=214 op=UNLOAD Dec 13 14:52:00.471000 audit: BPF prog-id=213 op=UNLOAD Dec 13 14:52:00.471000 audit[6079]: AVC avc: denied { bpf } for pid=6079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.471000 audit[6079]: AVC avc: denied { bpf } for pid=6079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.471000 audit[6079]: AVC avc: denied { bpf } for pid=6079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.471000 audit[6079]: AVC avc: denied { perfmon } for pid=6079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.471000 audit[6079]: AVC avc: denied { perfmon } for pid=6079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.471000 audit[6079]: AVC avc: denied { perfmon } for pid=6079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.471000 audit[6079]: AVC avc: denied { perfmon } for pid=6079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.471000 audit[6079]: AVC avc: denied { perfmon } for pid=6079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.471000 audit[6079]: AVC avc: denied { bpf } for pid=6079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.471000 audit[6079]: AVC avc: denied { bpf } for pid=6079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:00.471000 audit: BPF prog-id=215 op=LOAD Dec 13 14:52:00.471000 audit[6079]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c86b8 items=0 ppid=2350 pid=6079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:52:00.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465663762353339303336356466346438656165396361393235393463 Dec 13 14:52:00.522326 env[1768]: time="2024-12-13T14:52:00.522232675Z" level=info msg="StartContainer for \"def7b5390365df4d8eae9ca92594cc1e58dcb126119f03385fd1f0bc722dd638\" returns successfully" Dec 13 14:52:01.256000 audit[4959]: AVC avc: denied { watch } for pid=4959 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_49_40.2120180835/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c443,c1017 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c443,c1017 tclass=file permissive=0 Dec 13 14:52:01.256000 audit[4959]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001622140 a2=fc6 a3=0 items=0 ppid=4440 pid=4959 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c443,c1017 key=(null) Dec 13 14:52:01.256000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:52:02.897000 audit[6101]: AVC avc: denied { watch } for pid=6101 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:52:02.897000 audit[6101]: AVC avc: denied { watch } for pid=6101 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:52:02.897000 audit[6101]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0003a3d20 a2=fc6 a3=0 items=0 ppid=2350 pid=6101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:52:02.897000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:52:02.897000 audit[6101]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0007b4000 a2=fc6 a3=0 items=0 ppid=2350 pid=6101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c519 key=(null) Dec 13 14:52:02.897000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:52:04.174000 audit[5037]: AVC avc: denied { watch } for pid=5037 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_49_40.3496681955/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c791 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c122,c791 tclass=file permissive=0 Dec 13 14:52:04.174000 audit[5037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00114a320 a2=fc6 a3=0 items=0 ppid=4738 pid=5037 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c791 key=(null) Dec 13 14:52:04.174000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:52:04.820565 systemd[1]: cri-containerd-110fb40e72c490616278f1a1ab17ea09c4d7bb284cf219ffb81de5c30a880326.scope: Deactivated successfully. Dec 13 14:52:04.820883 systemd[1]: cri-containerd-110fb40e72c490616278f1a1ab17ea09c4d7bb284cf219ffb81de5c30a880326.scope: Consumed 1.476s CPU time. Dec 13 14:52:04.829623 kernel: kauditd_printk_skb: 120 callbacks suppressed Dec 13 14:52:04.829754 kernel: audit: type=1334 audit(1734101524.824:1623): prog-id=81 op=UNLOAD Dec 13 14:52:04.829791 kernel: audit: type=1334 audit(1734101524.824:1624): prog-id=90 op=UNLOAD Dec 13 14:52:04.824000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:52:04.824000 audit: BPF prog-id=90 op=UNLOAD Dec 13 14:52:04.874743 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-110fb40e72c490616278f1a1ab17ea09c4d7bb284cf219ffb81de5c30a880326-rootfs.mount: Deactivated successfully. Dec 13 14:52:04.876826 env[1768]: time="2024-12-13T14:52:04.876770117Z" level=info msg="shim disconnected" id=110fb40e72c490616278f1a1ab17ea09c4d7bb284cf219ffb81de5c30a880326 Dec 13 14:52:04.878391 env[1768]: time="2024-12-13T14:52:04.876825792Z" level=warning msg="cleaning up after shim disconnected" id=110fb40e72c490616278f1a1ab17ea09c4d7bb284cf219ffb81de5c30a880326 namespace=k8s.io Dec 13 14:52:04.878391 env[1768]: time="2024-12-13T14:52:04.876838486Z" level=info msg="cleaning up dead shim" Dec 13 14:52:04.895772 env[1768]: time="2024-12-13T14:52:04.895723741Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:52:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6140 runtime=io.containerd.runc.v2\n" Dec 13 14:52:05.278599 kubelet[2628]: I1213 14:52:05.278572 2628 scope.go:117] "RemoveContainer" containerID="110fb40e72c490616278f1a1ab17ea09c4d7bb284cf219ffb81de5c30a880326" Dec 13 14:52:05.281339 env[1768]: time="2024-12-13T14:52:05.281302691Z" level=info msg="CreateContainer within sandbox \"cb9e89aceaf4ef4a07a2398679f837bb75984d1d8b906165255ba12b63b4973e\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Dec 13 14:52:05.303298 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1487534139.mount: Deactivated successfully. Dec 13 14:52:05.316878 env[1768]: time="2024-12-13T14:52:05.316823773Z" level=info msg="CreateContainer within sandbox \"cb9e89aceaf4ef4a07a2398679f837bb75984d1d8b906165255ba12b63b4973e\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"6f429b6967a09626d7915c3249882ca650f6da84f81fcb60a8a5b73bc43fef46\"" Dec 13 14:52:05.317646 env[1768]: time="2024-12-13T14:52:05.317617852Z" level=info msg="StartContainer for \"6f429b6967a09626d7915c3249882ca650f6da84f81fcb60a8a5b73bc43fef46\"" Dec 13 14:52:05.343717 systemd[1]: Started cri-containerd-6f429b6967a09626d7915c3249882ca650f6da84f81fcb60a8a5b73bc43fef46.scope. Dec 13 14:52:05.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.375139 kernel: audit: type=1400 audit(1734101525.365:1625): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.375381 kernel: audit: type=1400 audit(1734101525.365:1626): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.378665 kernel: audit: type=1400 audit(1734101525.365:1627): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.382242 kernel: audit: type=1400 audit(1734101525.365:1628): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.382348 kernel: audit: type=1400 audit(1734101525.365:1629): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.385774 kernel: audit: type=1400 audit(1734101525.365:1630): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.396839 kernel: audit: type=1400 audit(1734101525.365:1631): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.397046 kernel: audit: type=1400 audit(1734101525.365:1632): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.366000 audit: BPF prog-id=216 op=LOAD Dec 13 14:52:05.367000 audit[6161]: AVC avc: denied { bpf } for pid=6161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.367000 audit[6161]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2349 pid=6161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:52:05.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666343239623639363761303936323664373931356333323439383832 Dec 13 14:52:05.367000 audit[6161]: AVC avc: denied { perfmon } for pid=6161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.367000 audit[6161]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2349 pid=6161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:52:05.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666343239623639363761303936323664373931356333323439383832 Dec 13 14:52:05.367000 audit[6161]: AVC avc: denied { bpf } for pid=6161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.367000 audit[6161]: AVC avc: denied { bpf } for pid=6161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.367000 audit[6161]: AVC avc: denied { bpf } for pid=6161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.367000 audit[6161]: AVC avc: denied { perfmon } for pid=6161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.367000 audit[6161]: AVC avc: denied { perfmon } for pid=6161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.367000 audit[6161]: AVC avc: denied { perfmon } for pid=6161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.367000 audit[6161]: AVC avc: denied { perfmon } for pid=6161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.367000 audit[6161]: AVC avc: denied { perfmon } for pid=6161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.367000 audit[6161]: AVC avc: denied { bpf } for pid=6161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.367000 audit[6161]: AVC avc: denied { bpf } for pid=6161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.367000 audit: BPF prog-id=217 op=LOAD Dec 13 14:52:05.367000 audit[6161]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000306680 items=0 ppid=2349 pid=6161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:52:05.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666343239623639363761303936323664373931356333323439383832 Dec 13 14:52:05.370000 audit[6161]: AVC avc: denied { bpf } for pid=6161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.370000 audit[6161]: AVC avc: denied { bpf } for pid=6161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.370000 audit[6161]: AVC avc: denied { perfmon } for pid=6161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.370000 audit[6161]: AVC avc: denied { perfmon } for pid=6161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.370000 audit[6161]: AVC avc: denied { perfmon } for pid=6161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.370000 audit[6161]: AVC avc: denied { perfmon } for pid=6161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.370000 audit[6161]: AVC avc: denied { perfmon } for pid=6161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.370000 audit[6161]: AVC avc: denied { bpf } for pid=6161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.370000 audit[6161]: AVC avc: denied { bpf } for pid=6161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.370000 audit: BPF prog-id=218 op=LOAD Dec 13 14:52:05.370000 audit[6161]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003066c8 items=0 ppid=2349 pid=6161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:52:05.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666343239623639363761303936323664373931356333323439383832 Dec 13 14:52:05.381000 audit: BPF prog-id=218 op=UNLOAD Dec 13 14:52:05.381000 audit: BPF prog-id=217 op=UNLOAD Dec 13 14:52:05.381000 audit[6161]: AVC avc: denied { bpf } for pid=6161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.381000 audit[6161]: AVC avc: denied { bpf } for pid=6161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.381000 audit[6161]: AVC avc: denied { bpf } for pid=6161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.381000 audit[6161]: AVC avc: denied { perfmon } for pid=6161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.381000 audit[6161]: AVC avc: denied { perfmon } for pid=6161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.381000 audit[6161]: AVC avc: denied { perfmon } for pid=6161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.381000 audit[6161]: AVC avc: denied { perfmon } for pid=6161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.381000 audit[6161]: AVC avc: denied { perfmon } for pid=6161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.381000 audit[6161]: AVC avc: denied { bpf } for pid=6161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.381000 audit[6161]: AVC avc: denied { bpf } for pid=6161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:52:05.381000 audit: BPF prog-id=219 op=LOAD Dec 13 14:52:05.381000 audit[6161]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000306ad8 items=0 ppid=2349 pid=6161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:52:05.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666343239623639363761303936323664373931356333323439383832 Dec 13 14:52:05.436451 env[1768]: time="2024-12-13T14:52:05.436398791Z" level=info msg="StartContainer for \"6f429b6967a09626d7915c3249882ca650f6da84f81fcb60a8a5b73bc43fef46\" returns successfully" Dec 13 14:52:06.443190 kubelet[2628]: E1213 14:52:06.443042 2628 controller.go:195] "Failed to update lease" err="Put \"https://172.31.25.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-13?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 13 14:52:08.868000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:52:08.868000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:52:08.868000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c00674dda0 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:52:08.868000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:52:08.868000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:52:08.868000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c007785560 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:52:08.868000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:52:08.868000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:52:08.868000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c007785680 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:52:08.868000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:52:08.868000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c005c7f080 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:52:08.868000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:52:08.888000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:52:08.888000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c0051b5b80 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:52:08.888000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:52:08.889000 audit[2462]: AVC avc: denied { watch } for pid=2462 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:52:08.889000 audit[2462]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c0077858c0 a2=fc6 a3=0 items=0 ppid=2312 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c896 key=(null) Dec 13 14:52:08.889000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:52:13.515457 systemd[1]: run-containerd-runc-k8s.io-94db4d3ba450f57d79f668c14fc186d8b37c8b48aa2064ae80f86fe82b3454ae-runc.rtqDaY.mount: Deactivated successfully. Dec 13 14:52:16.445022 kubelet[2628]: E1213 14:52:16.444985 2628 controller.go:195] "Failed to update lease" err="the server was unable to return a response in the time allotted, but may still be processing the request (put leases.coordination.k8s.io ip-172-31-25-13)"